CVE-2023-37914

moderate-risk
Published 2023-08-17

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can view `Invitation.WebHome` can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This vulnerability has been patched on XWiki 14.4.8, 15.2-rc-1, and 14.10.6. Users are advised to upgrade. Users unable to upgrade may manually apply the patch on `Invitation.InvitationCommon` and `Invitation.InvitationConfig`, but there are otherwise no known workarounds for this vulnerability.

Do I need to act?

~
4.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: b469b950e7fe3d22f00b639d43f286bf871472b1, db1b7950037774552be2897571c2e1c5a7589400, b30cbc9010741699e70111d7f905ad1b592e1e2c
9
CVSS 9.9/10 Critical
NETWORK / LOW complexity

Affected Products (1)

Affected Vendors

46
/ 100
moderate-risk
Severity 33/34 · Critical
Exploitability 8/34 · Low
Exposure 5/34 · Minimal