CVE-2022-29253
low-risk
Published 2022-05-25
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting with version 8.3-rc-1 and prior to versions 12.10.3 and 14.0, one can ask for any file located in the classloader using the template API and a path with ".." in it. The issue is patched in versions 14.0 and 13.10.3. There is no easy workaround for this issue.
Do I need to act?
-
0.06% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
2
CVSS 2.7/10
Low
NETWORK
/ LOW complexity
Affected Vendors
References (6)
Third Party Advisory
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9qrp-h7fw-42hg
Vendor Advisory
https://jira.xwiki.org/browse/XWIKI-19349
Third Party Advisory
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9qrp-h7fw-42hg
Vendor Advisory
https://jira.xwiki.org/browse/XWIKI-19349
21
/ 100
low-risk
Severity
14/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
7/34 · Low