CVE-2022-36094
high-risk
Published 2022-09-08
XWiki Platform Web Parent POM contains Web resources for the XWiki platform, a generic wiki platform. Starting with version 1.0 and prior to versions 13.10.6 and 14.30-rc-1, it's possible to store JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3RC1. As a workaround, it is possible to replace `viewattachrev.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.
Do I need to act?
!
49.2% chance of exploitation in next 30 days
EPSS score — higher than 51% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.9/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Third Party Advisory
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mxf2-4r22-5hq9
Third Party Advisory
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mxf2-4r22-5hq9
53
/ 100
high-risk
Severity
30/34 · Critical
Exploitability
18/34 · Moderate
Exposure
5/34 · Minimal