Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-37901 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: XWiki Platform allows arbitrary Remote Code Execution (RCE) via user profiles.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-95** (Improper Neutralization of Code). <br>πŸ” **Flaw**: The system fails to properly sanitize user input when adding instances to user profiles or pages, allowing malicious code injection.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected Versions**: <br>β€’ 9.2-rc-1 to 14.10.21 <br>β€’ 15.0-rc-1 to 15.5.5 <br>β€’ 15.6-rc-1 to 15.10.2 <br>⚠️ **Product**: XWiki Platform (Open Source Wiki).

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: <br>β€’ Execute **Arbitrary Remote Code**. <br>β€’ Gain **High Privileges** (CVSS A:H, I:H, C:H). <br>β€’ Access sensitive data and modify system integrity.

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Exploitation Threshold**: <br>β€’ **Auth Required**: Yes (PR:L). <br>β€’ **Condition**: User must have **Edit Permissions**. <br>β€’ **UI Required**: No (UI:N). <br>πŸ“‰ **Difficulty**: Low for authenticated editors.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exploit**: <br>β€’ **PoC Status**: No specific PoC listed in data (pocs: []). <br>β€’ **Wild Exploitation**: Likely low initially, but RCE risks are high once authenticated.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: <br>1. Identify XWiki version. <br>2. Check if version falls in affected ranges. <br>3. Review user permissions for 'Edit' access. <br>4. Scan for code injection in user profiles.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Official Fix**: <br>β€’ **Status**: Fixed via GitHub commits (e.g., 742cd45, bbde8a4). <br>β€’ **Action**: Upgrade to versions **14.10.21+**, **15.5.5+**, or **15.10.2+**.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: <br>β€’ **Restrict Permissions**: Remove 'Edit' rights for untrusted users. <br>β€’ **Input Validation**: Manually sanitize user profile fields.…

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **HIGH**. <br>β€’ **CVSS Score**: High (9.8+ implied by vector). <br>β€’ **Priority**: Immediate patching recommended for all affected versions. RCE is critical.