Missing Authorization in XWiki Platform
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The application allows anyone with view access to modify any page of the wiki by importing a crafted XAR package. The problem has been patched in XWiki 14.6RC1, 14.6 and 13.10.8. As a workaround, setting the right of the page Filter.WebHome and making sure only the main wiki administrators can view the application installed on main wiki or edit the page and apply the changed described in commit fb49b4f.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.xwiki.platform:xwiki-platform-filter-uiMaven | < 13.10.8 | 13.10.8 |
org.xwiki.platform:xwiki-platform-filter-uiMaven | >= 14.0.0, < 14.4.3 | 14.4.3 |
org.xwiki.platform:xwiki-platform-filter-uiMaven | >= 14.5.0, < 14.6-rc-1 | 14.6-rc-1 |
Affected products
1- Range: < 13.10.8
Patches
1fb49b4f289eeXWIKI-19758: Better control in Filter application
1 file changed · +16 −5
xwiki-platform-core/xwiki-platform-filter/xwiki-platform-filter-ui/src/main/resources/Filter/WebHome.xml+16 −5 modified@@ -20,7 +20,7 @@ * 02110-1301 USA, or see the FSF site: http://www.fsf.org. --> -<xwikidoc version="1.3" reference="Filter.WebHome" locale=""> +<xwikidoc version="1.5" reference="Filter.WebHome" locale=""> <web>Filter</web> <name>WebHome</name> <language/> @@ -36,9 +36,7 @@ <minorEdit>false</minorEdit> <syntaxId>xwiki/2.1</syntaxId> <hidden>true</hidden> - <content>{{warning}}Filter module is still young and experimental and while exporting should be safe enough, importing can be more risky for the current instance.{{/warning}} - -{{include reference="FilterStreamDescriptorForm"/}} + <content>{{include reference="FilterStreamDescriptorForm"/}} {{velocity output="true"}} #set($input = $request.input) @@ -77,6 +75,7 @@ {{velocity}} #if ($request.convert) + #if ($services.security.authorization.hasAccess('programming', $context.userReference, $doc.documentReference)) #if ($targetStandardOutput) $response.setContentType('application/octet-stream') $response.setHeader('Content-Disposition', 'attachment; filename=target'); @@ -107,6 +106,9 @@ #end #end #end + #else + {{error}}You are not allowed to start a conversion.{{/error}} + #end #end {{/velocity}} @@ -167,7 +169,11 @@ </fieldset> <p> - <input class="button" type="submit" name="convert" value="Convert"/> + #if ($services.security.authorization.hasAccess('programming', $context.userReference, $doc.documentReference)) + <input class="button" type="submit" name="convert" value="Convert"/> + #else + <input class="button" type="submit" name="convert" value="Convert" disabled title="You are not allowed to start a conversion."/> + #end </p> </div> </form> @@ -189,8 +195,11 @@ <validationScript/> <cache> <cache>0</cache> + <defaultValue>long</defaultValue> <disabled>0</disabled> <displayType>select</displayType> + <freeText>forbidden</freeText> + <largeStorage>0</largeStorage> <multiSelect>0</multiSelect> <name>cache</name> <number>5</number> @@ -238,6 +247,8 @@ <cache>0</cache> <disabled>0</disabled> <displayType>select</displayType> + <freeText>forbidden</freeText> + <largeStorage>0</largeStorage> <multiSelect>0</multiSelect> <name>use</name> <number>3</number>
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-q6jp-gcww-8v2jghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-41937ghsaADVISORY
- github.com/xwiki/xwiki-platform/commit/fb49b4f289ee28e45cfada8e97e320cd3ed27113ghsaWEB
- github.com/xwiki/xwiki-platform/security/advisories/GHSA-q6jp-gcww-8v2jghsaWEB
- jira.xwiki.org/browse/XWIKI-19758ghsaWEB
News mentions
0No linked articles in our index yet.