XWiki Platform is a generic wiki platform. Starting in version 5.4.4 and prior to versions 14.4.8, 14.10.4, and 15.0, a stored cross-site scripting vulnerability can be exploited by users with edit rights by adding a `AppWithinMinutes.FormFieldCategoryClass` class on a page and setting the payload on the page title. Then, any user visiting `/xwiki/bin/view/AppWithinMinutes/ClassEditSheet` executes the payload. The issue has been patched in XWiki 14.4.8, 14.10.4, and 15.0. As a workaround, update `AppWithinMinutes.ClassEditSheet` with a patch.
History

Fri, 29 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-06-23T17:19:59.290Z

Updated: 2024-11-29T14:27:48.189Z

Reserved: 2023-06-14T14:17:52.177Z

Link: CVE-2023-35153

cve-icon Vulnrichment

Updated: 2024-08-02T16:23:59.219Z

cve-icon NVD

Status : Modified

Published: 2023-06-23T18:15:13.970

Modified: 2024-11-21T08:08:02.750

Link: CVE-2023-35153

cve-icon Redhat

No data.