CVE-2022-36094

high-risk
Published 2022-09-08

XWiki Platform Web Parent POM contains Web resources for the XWiki platform, a generic wiki platform. Starting with version 1.0 and prior to versions 13.10.6 and 14.30-rc-1, it's possible to store JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3RC1. As a workaround, it is possible to replace `viewattachrev.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.

Do I need to act?

!
49.2% chance of exploitation in next 30 days
EPSS score — higher than 51% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.9/10 High
NETWORK / LOW complexity

Affected Products (1)

Affected Vendors

53
/ 100
high-risk
Severity 30/34 · Critical
Exploitability 18/34 · Moderate
Exposure 5/34 · Minimal