It's possible for anyone to inject SQL using the parameter sort of the getdeleteddocuments.vm
. It's injected as is as an ORDER BY value.
One can see the result of the injection with http://127.0.0.1:8080/xwiki/rest/liveData/sources/liveTable/entries?sourceParams.template=getdeleteddocuments.vm&sort=injected (this example does not work, but it shows that an HQL query was executed with the passed value which look nothing like an order by value, without any kind of sanitation).
This has been patched in 17.3.0-rc-1, 16.10.6.
There is no known workaround, other than upgrading XWiki.
https://jira.xwiki.org/browse/XWIKI-23093
If you have any questions or comments about this advisory: * Open an issue in Jira XWiki.org * Email us at Security Mailing List
The vulnerability was identifier by Aleksey Solovev from Positive Technologies.
{ "github_reviewed": true, "severity": "CRITICAL", "github_reviewed_at": "2025-07-24T18:09:01Z", "cwe_ids": [ "CWE-89" ], "nvd_published_at": "2025-07-24T23:15:26Z" }