Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-31984


XWiki Platform is a generic wiki platform. Starting in version 7.2-rc-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, by creating a document with a specially crafted title, it is possible to trigger remote code execution in the (Solr-based) search in XWiki. This allows any user who can edit the title of a space (all users by default) to execute any Groovy code in the XWiki installation which compromises the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 14.10.20, 15.5.4 and 15.10 RC1. As a workaround, manually apply the patch to the `Main.SolrSpaceFacet` page.


Published

2024-04-10T20:15:08.830

Last Modified

2025-01-21T16:20:37.297

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 9.9 (CRITICAL)

Weaknesses
  • Type: Secondary
    CWE-95
  • Type: Primary
    CWE-94

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application xwiki xwiki < 14.10.20 Yes
Application xwiki xwiki < 15.5.4 Yes
Application xwiki xwiki < 15.10 Yes
Application xwiki xwiki 7.2 Yes
Application xwiki xwiki 7.2 Yes

References