Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-29520— Page render failure due to broken translations in xwiki-platform

CVSS 4.3 · Medium EPSS 0.27% · P50
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-29520

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Page render failure due to broken translations in xwiki-platform
Source: NVD (National Vulnerability Database)
Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to break many translations coming from wiki pages by creating a corrupted document containing a translation object. This will lead to a broken page. The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no workarounds other than fixing any way to create a document that fail to load.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
未捕获的异常
Source: NVD (National Vulnerability Database)
Vulnerability Title
XWiki Platform 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
XWiki Platform是法国XWiki公司的一套用于创建Web协作应用程序的Wiki平台。 XWiki Platform 存在安全漏洞,该漏洞源于通过创建包含翻译对象的损坏文档,可以破坏来自 wiki 页面的许多翻译。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
xwikixwiki-platform < 13.10.11 -

II. Public POCs for CVE-2023-29520

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-29520

登录查看更多情报信息。

Same Patch Batch · xwiki · 2023-04-18 · 17 CVEs total

CVE-2023-2951410.0 CRITICALCode injection in template provider administration in xwiki-platform
CVE-2023-2951010.0 CRITICALCode injection via unescaped translations in xwiki-platform
CVE-2023-2952310.0 CRITICALCode injection in display method used in user profiles in xwiki-platform
CVE-2023-2952410.0 CRITICALCode injection from account through XWiki.SchedulerJobSheet in xwiki-platform
CVE-2023-2952510.0 CRITICALPrivilege escalation from view right on XWiki.Notifications.Code.LegacyNotificationAdminis
CVE-2023-2952610.0 CRITICALAsync and display macro allow displaying and interacting with any document in restricted m
CVE-2023-2952710.0 CRITICALCode injection from account through AWM view sheet in xwiki platform
CVE-2023-295169.9 CRITICALCode injection from view right on XWiki.AttachmentSelector in xwiki-platform
CVE-2023-295129.9 CRITICALCode injection in xwiki-platform-web-templates
CVE-2023-295229.9 CRITICALCode injection from view right on XWiki.ClassSheet in xwiki-platform
CVE-2023-295189.9 CRITICALCode injection from view right using Invitation.InvitationCommon in xwiki-platform
CVE-2023-295199.1 CRITICALCode injection in org.xwiki.platform:xwiki-platform-attachment-ui
CVE-2023-295218.4 HIGHCode injection from account/view through VFS Tree macro in xwiki-platform
CVE-2023-295157.7 HIGHCross-site scripting (XSS) in xwiki-platform
CVE-2023-295177.5 HIGHExposure of Sensitive Information to an Unauthorized Actor in org.xwiki.platform:xwiki-pla
CVE-2023-295135.0 MEDIUMUsers can be created even when registration is disabled without validation via the templat

IV. Related Vulnerabilities

V. Comments for CVE-2023-29520

Anonymous User
2026-01-15 06:09:28

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


Leave a comment