Code injection in org.xwiki.platform:xwiki-platform-attachment-ui
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the "property" field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.xwiki.platform:xwiki-platform-attachment-uiMaven | >= 3.0-rc-1, < 13.10.11 | 13.10.11 |
org.xwiki.platform:xwiki-platform-attachment-uiMaven | >= 14.0-rc-1, < 14.4.8 | 14.4.8 |
org.xwiki.platform:xwiki-platform-attachment-uiMaven | >= 14.5, < 14.10.2 | 14.10.2 |
Affected products
1- Range: < 13.10.11
Patches
15e8725b4272cXWIKI-20354: Attachment selector properties are missing escaping
1 file changed · +1 −1
xwiki-platform-core/xwiki-platform-attachment/xwiki-platform-attachment-ui/src/main/resources/XWiki/AttachmentSelector.xml+1 −1 modified@@ -1651,7 +1651,7 @@ $xwiki.ssx.use($xcontext.macro.doc.fullName)## #elseif ($xcontext.action == 'inline' || $xcontext.action == 'edit') (% class="attachment-picker" %)(((## #attachmentPicker_displayAttachment($propValue $displayImage false true) #attachmentPicker_displayButton()## - {{html}}<input type="hidden" name="${classname}_${object}_${property}" value="${propValue}" class="property-reference"/>{{/html}}## + {{html}}<input type="hidden" name="$escapetool.xml("${classname}_${object}_${property}")" value="$escapetool.xml("${propValue}")" class="property-reference"/>{{/html}}## ))) #else #attachmentPicker_displayAttachment($propValue $displayImage $link false)
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-3hjg-cghv-22wwghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-29519ghsaADVISORY
- github.com/xwiki/xwiki-platform/commit/5e8725b4272cd3e5be09d3ca84273be2da6869c1ghsax_refsource_MISCWEB
- github.com/xwiki/xwiki-platform/security/advisories/GHSA-3hjg-cghv-22wwghsax_refsource_CONFIRMWEB
- jira.xwiki.org/browse/XWIKI-20364ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.