Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-29519— Code injection in org.xwiki.platform:xwiki-platform-attachment-ui

CVSS 9.1 · Critical EPSS 4.74% · P89
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-29519

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Code injection in org.xwiki.platform:xwiki-platform-attachment-ui
Source: NVD (National Vulnerability Database)
Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the "property" field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
输出中的特殊元素转义处理不恰当(注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
XWiki Platform 注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
XWiki Platform是法国XWiki公司的一套用于创建Web协作应用程序的Wiki平台。 XWiki Platform 存在注入漏洞,该漏洞源于已注册的用户可以通过在 attachment selector 的 property 字段中注入适当的代码来执行远程代码执行,从而导致权限升级。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
xwikixwiki-platform < 13.10.11 -

II. Public POCs for CVE-2023-29519

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-29519

登录查看更多情报信息。

Same Patch Batch · xwiki · 2023-04-18 · 17 CVEs total

CVE-2023-2951410.0 CRITICALCode injection in template provider administration in xwiki-platform
CVE-2023-2951010.0 CRITICALCode injection via unescaped translations in xwiki-platform
CVE-2023-2952310.0 CRITICALCode injection in display method used in user profiles in xwiki-platform
CVE-2023-2952410.0 CRITICALCode injection from account through XWiki.SchedulerJobSheet in xwiki-platform
CVE-2023-2952510.0 CRITICALPrivilege escalation from view right on XWiki.Notifications.Code.LegacyNotificationAdminis
CVE-2023-2952610.0 CRITICALAsync and display macro allow displaying and interacting with any document in restricted m
CVE-2023-2952710.0 CRITICALCode injection from account through AWM view sheet in xwiki platform
CVE-2023-295169.9 CRITICALCode injection from view right on XWiki.AttachmentSelector in xwiki-platform
CVE-2023-295129.9 CRITICALCode injection in xwiki-platform-web-templates
CVE-2023-295229.9 CRITICALCode injection from view right on XWiki.ClassSheet in xwiki-platform
CVE-2023-295189.9 CRITICALCode injection from view right using Invitation.InvitationCommon in xwiki-platform
CVE-2023-295218.4 HIGHCode injection from account/view through VFS Tree macro in xwiki-platform
CVE-2023-295157.7 HIGHCross-site scripting (XSS) in xwiki-platform
CVE-2023-295177.5 HIGHExposure of Sensitive Information to an Unauthorized Actor in org.xwiki.platform:xwiki-pla
CVE-2023-295135.0 MEDIUMUsers can be created even when registration is disabled without validation via the templat
CVE-2023-295204.3 MEDIUMPage render failure due to broken translations in xwiki-platform

IV. Related Vulnerabilities

V. Comments for CVE-2023-29519

Anonymous User
2026-01-15 06:09:28

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


Leave a comment