CVE-2023-29519

Source
https://cve.org/CVERecord?id=CVE-2023-29519
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-29519.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-29519
Aliases
Published
2023-04-18T23:31:09.369Z
Modified
2026-04-25T04:16:57.266937Z
Severity
  • 9.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Code injection in org.xwiki.platform:xwiki-platform-attachment-ui
Details

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the "property" field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Database specific
{
    "cwe_ids": [
        "CWE-74"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/29xxx/CVE-2023-29519.json",
    "unresolved_ranges": [
        {
            "source": "AFFECTED_FIELD",
            "extracted_events": [
                {
                    "fixed": "13.10.11"
                },
                {
                    "introduced": "14.0.0"
                },
                {
                    "fixed": "14.4.8"
                },
                {
                    "introduced": "14.5.0"
                },
                {
                    "fixed": "14.10.2"
                }
            ]
        }
    ]
}
References

Affected packages

Git / github.com/xwiki/xwiki-platform

Affected ranges

Type
GIT
Repo
https://github.com/xwiki/xwiki-platform
Events
Database specific
{
    "source": [
        "CPE_FIELD",
        "REFERENCES"
    ],
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "fixed": "13.10.11"
        },
        {
            "introduced": "14.0"
        },
        {
            "fixed": "14.4.8"
        },
        {
            "introduced": "14.5"
        },
        {
            "fixed": "14.10.2"
        }
    ],
    "cpe": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*"
}

Affected versions

xwiki-platform-13.*
xwiki-platform-13.10
xwiki-platform-13.10-rc-1
xwiki-platform-13.10.1
xwiki-platform-13.10.10
xwiki-platform-13.10.2
xwiki-platform-13.10.3
xwiki-platform-13.10.4
xwiki-platform-13.10.5
xwiki-platform-13.10.6
xwiki-platform-13.10.7
xwiki-platform-13.10.9
xwiki-platform-14.*
xwiki-platform-14.10
xwiki-platform-14.10.1
xwiki-platform-14.4
xwiki-platform-14.4-rc-1
xwiki-platform-14.4.1
xwiki-platform-14.4.2
xwiki-platform-14.4.3
xwiki-platform-14.4.4
xwiki-platform-14.4.5
xwiki-platform-14.4.6
xwiki-platform-14.4.7
xwiki-platform-7.*
xwiki-platform-7.3-milestone-2
xwiki-platform-7.4-milestone-1
xwiki-platform-7.4-milestone-2
xwiki-platform-8.*
xwiki-platform-8.0-milestone-1
xwiki-platform-8.0-milestone-2
xwiki-platform-8.1-milestone-1
xwiki-platform-8.1-milestone-2
xwiki-platform-8.2-milestone-1
xwiki-platform-8.2-milestone-2
xwiki-platform-8.3-milestone-1
xwiki-platform-9.*
xwiki-platform-9.9-rc-2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-29519.json"