CVE-2023-37912

high-risk
Published 2023-10-25

XWiki Rendering is a generic Rendering system that converts textual input in a given syntax into another syntax. Prior to version 14.10.6 of `org.xwiki.platform:xwiki-core-rendering-macro-footnotes` and `org.xwiki.platform:xwiki-rendering-macro-footnotes` and prior to version 15.1-rc-1 of `org.xwiki.platform:xwiki-rendering-macro-footnotes`, the footnote macro executed its content in a potentially different context than the one in which it was defined. In particular in combination with the include macro, this allows privilege escalation from a simple user account in XWiki to programming rights and thus remote code execution, impacting the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.6 and 15.1-rc-1. There is no workaround apart from upgrading to a fixed version of the footnote macro.

Do I need to act?

~
9.9% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 351c65f14efa17fbc8dfe0277a5a66ffc3ddc4df, 720a021c52aadff58563a6328433810e0ccb5ea9
9
CVSS 9.9/10 Critical
NETWORK / LOW complexity

Affected Products (2)

Xwiki-Rendering
Xwiki-Rendering

Affected Vendors

51
/ 100
high-risk
Severity 33/34 · Critical
Exploitability 11/34 · Low
Exposure 7/34 · Low