org.xwiki.platform:xwiki-platform-flamingo-theme-ui Eval Injection vulnerability
Description
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the documentTree macro parameters in This macro is installed by default in FlamingoThemesCode.WebHome. This page is installed by default. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.xwiki.platform:xwiki-platform-flamingo-theme-uiMaven | >= 7.2-rc-1, < 13.10.11 | 13.10.11 |
org.xwiki.platform:xwiki-platform-flamingo-theme-uiMaven | >= 14.0-rc-1, < 14.4.7 | 14.4.7 |
org.xwiki.platform:xwiki-platform-flamingo-theme-uiMaven | >= 14.5, < 14.10 | 14.10 |
Affected products
1- Range: >= 7.2-rc-1, < 13.10.11
Patches
180d5be36f700XWIKI-20279: Improved escaping in FlamingoThemesCode.WebHome
2 files changed · +14 −1
xwiki-platform-core/xwiki-platform-flamingo/xwiki-platform-flamingo-theme/xwiki-platform-flamingo-theme-ui/pom.xml+8 −0 modified@@ -110,6 +110,14 @@ <version>${project.version}</version> <scope>runtime</scope> </dependency> + <!-- Required for the documentTree macro. --> + <dependency> + <groupId>org.xwiki.platform</groupId> + <artifactId>xwiki-platform-index-tree-macro</artifactId> + <version>${project.version}</version> + <scope>runtime</scope> + <type>xar</type> + </dependency> <!-- Test dependencies. --> <dependency> <groupId>org.xwiki.platform</groupId>
xwiki-platform-core/xwiki-platform-flamingo/xwiki-platform-flamingo-theme/xwiki-platform-flamingo-theme-ui/src/main/resources/FlamingoThemesCode/WebHome.xml+6 −1 modified@@ -37,6 +37,11 @@ <syntaxId>xwiki/2.1</syntaxId> <hidden>true</hidden> <content>{{velocity}} -{{documentTree showTranslations="false" showAttachments="false" root="document:$doc.documentReference" /}} +#set ($documentReference = $services.rendering.escape("document:$doc.documentReference", 'xwiki/2.1')) +{{documentTree + showTranslations="false" + showAttachments="false" + root="$documentReference" +/}} {{/velocity}}</content> </xwikidoc>
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-f4v8-58f6-mwj4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-29509ghsaADVISORY
- github.com/xwiki/xwiki-platform/commit/80d5be36f700adcd56b6c8eb3ed8b973f62ec0aeghsax_refsource_MISCWEB
- github.com/xwiki/xwiki-platform/security/advisories/GHSA-f4v8-58f6-mwj4ghsax_refsource_CONFIRMWEB
- jira.xwiki.org/browse/XWIKI-20279ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.