CVE-2024-55662
moderate-risk
Published 2024-12-12
XWiki Platform is a generic wiki platform. Starting in version 3.3-milestone-1 and prior to versions 15.10.9 and 16.3.0, on instances where `Extension Repository Application` is installed, any user can execute any code requiring `programming` rights on the server. This vulnerability has been fixed in XWiki 15.10.9 and 16.3.0. Since `Extension Repository Application` is not mandatory, it can be safely disabled on instances that do not use it as a workaround. It is also possible to manually apply the patches from commit 8659f17d500522bf33595e402391592a35a162e8 to the page `ExtensionCode.ExtensionSheet` and to the page `ExtensionCode.ExtensionAuthorsDisplayer`.
Do I need to act?
~
9.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 1c4b9ba5f04cd8d636a6718465a0b8e251f51420, 50fb1f191827504c6173697d6c39aa093301a851
9
CVSS 9.9/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
49
/ 100
moderate-risk
Severity
33/34 · Critical
Exploitability
11/34 · Low
Exposure
5/34 · Minimal