CVE-2022-36096
high-risk
Published 2022-09-08
The XWiki Platform Index UI is an Index of all pages, attachments, orphans and deleted pages and attachments for XWiki Platform, a generic wiki platform. Prior to versions 13.10.6 and 14.3, it's possible to store JavaScript which will be executed by anyone viewing the deleted attachments index with an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3. As a workaround, modify fix the vulnerability by editing the wiki page `XWiki.DeletedAttachments` with the object editor, open the `JavaScriptExtension` object and apply on the content the changes that can be found on the fix commit.
Do I need to act?
!
54.5% chance of exploitation in next 30 days
EPSS score — higher than 45% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.9/10
High
NETWORK
/ LOW complexity
Affected Vendors
References (6)
Third Party Advisory
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gjmq-x5x7-wc36
Vendor Advisory
https://jira.xwiki.org/browse/XWIKI-19613
Third Party Advisory
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gjmq-x5x7-wc36
Vendor Advisory
https://jira.xwiki.org/browse/XWIKI-19613
55
/ 100
high-risk
Severity
30/34 · Critical
Exploitability
18/34 · Moderate
Exposure
7/34 · Low