XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It is possible to persistently inject scripts in XWiki versions prior to 12.6.3 and 12.8. Unregistred users can fill simple text fields. Registered users can fill in their personal information and (if they have edit rights) fill the values of static lists using App Within Minutes. There is no easy workaround except upgrading XWiki. The vulnerability has been patched on XWiki 12.8 and 12.6.3.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5c66-v29h-xjh8 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-04-20 12:15
Updated : 2021-04-29 13:21
NVD link : CVE-2021-29459
Mitre link : CVE-2021-29459
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
xwiki
- xwiki