VYPR
Critical severityNVD Advisory· Published Nov 22, 2022· Updated Apr 23, 2025

Missing Authorization in XWiki Platform

CVE-2022-41937

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The application allows anyone with view access to modify any page of the wiki by importing a crafted XAR package. The problem has been patched in XWiki 14.6RC1, 14.6 and 13.10.8. As a workaround, setting the right of the page Filter.WebHome and making sure only the main wiki administrators can view the application installed on main wiki or edit the page and apply the changed described in commit fb49b4f.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.xwiki.platform:xwiki-platform-filter-uiMaven
< 13.10.813.10.8
org.xwiki.platform:xwiki-platform-filter-uiMaven
>= 14.0.0, < 14.4.314.4.3
org.xwiki.platform:xwiki-platform-filter-uiMaven
>= 14.5.0, < 14.6-rc-114.6-rc-1

Affected products

1

Patches

1
fb49b4f289ee

XWIKI-19758: Better control in Filter application

https://github.com/xwiki/xwiki-platformThomas MortagneJun 30, 2022via ghsa
1 file changed · +16 5
  • xwiki-platform-core/xwiki-platform-filter/xwiki-platform-filter-ui/src/main/resources/Filter/WebHome.xml+16 5 modified
    @@ -20,7 +20,7 @@
      * 02110-1301 USA, or see the FSF site: http://www.fsf.org.
     -->
     
    -<xwikidoc version="1.3" reference="Filter.WebHome" locale="">
    +<xwikidoc version="1.5" reference="Filter.WebHome" locale="">
       <web>Filter</web>
       <name>WebHome</name>
       <language/>
    @@ -36,9 +36,7 @@
       <minorEdit>false</minorEdit>
       <syntaxId>xwiki/2.1</syntaxId>
       <hidden>true</hidden>
    -  <content>{{warning}}Filter module is still young and experimental and while exporting should be safe enough, importing can be more risky for the current instance.{{/warning}}
    -
    -{{include reference="FilterStreamDescriptorForm"/}}
    +  <content>{{include reference="FilterStreamDescriptorForm"/}}
     
     {{velocity output="true"}}
     #set($input = $request.input)
    @@ -77,6 +75,7 @@
     
     {{velocity}}
     #if ($request.convert)
    +  #if ($services.security.authorization.hasAccess('programming', $context.userReference, $doc.documentReference))
       #if ($targetStandardOutput)
         $response.setContentType('application/octet-stream')
         $response.setHeader('Content-Disposition', 'attachment; filename=target');
    @@ -107,6 +106,9 @@
           #end
         #end
       #end
    +  #else
    +    {{error}}You are not allowed to start a conversion.{{/error}}
    +  #end
     #end
     {{/velocity}}
     
    @@ -167,7 +169,11 @@
       &lt;/fieldset&gt;
     
       &lt;p&gt;
    -  &lt;input class="button" type="submit" name="convert" value="Convert"/&gt;
    +    #if ($services.security.authorization.hasAccess('programming', $context.userReference, $doc.documentReference))
    +      &lt;input class="button" type="submit" name="convert" value="Convert"/&gt;
    +    #else
    +      &lt;input class="button" type="submit" name="convert" value="Convert" disabled title="You are not allowed to start a conversion."/&gt;
    +    #end
       &lt;/p&gt;
     &lt;/div&gt;
     &lt;/form&gt;
    @@ -189,8 +195,11 @@
           <validationScript/>
           <cache>
             <cache>0</cache>
    +        <defaultValue>long</defaultValue>
             <disabled>0</disabled>
             <displayType>select</displayType>
    +        <freeText>forbidden</freeText>
    +        <largeStorage>0</largeStorage>
             <multiSelect>0</multiSelect>
             <name>cache</name>
             <number>5</number>
    @@ -238,6 +247,8 @@
             <cache>0</cache>
             <disabled>0</disabled>
             <displayType>select</displayType>
    +        <freeText>forbidden</freeText>
    +        <largeStorage>0</largeStorage>
             <multiSelect>0</multiSelect>
             <name>use</name>
             <number>3</number>
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.