Critical severityNVD Advisory· Published May 9, 2023· Updated Jan 28, 2025
XWiki Platform privilege escalation (PR)/RCE from account through class sheet
CVE-2023-32069
Description
XWiki Platform is a generic wiki platform. Starting in version 3.3-milestone-2 and prior to versions 14.10.4 and 15.0-rc-1, it's possible for a user to execute anything with the right of the author of the XWiki.ClassSheet document. This has been patched in XWiki 15.0-rc-1 and 14.10.4. There are no known workarounds.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.xwiki.platform:xwiki-platform-test-uiMaven | >= 3.3-milestone-3, < 14.10.4 | 14.10.4 |
Affected products
1- Range: >= 3.3-milestone-3, < 14.10.4
Patches
1de72760d4a3eXWIKI-20566: Improve Class Sheet display
1 file changed · +1 −1
xwiki-platform-core/xwiki-platform-xclass/xwiki-platform-xclass-ui/src/main/resources/XWiki/ClassSheet.xml+1 −1 modified@@ -83,7 +83,7 @@ ## sheet output. Class authors can put the description of the class in the class document content. #set($classSheetReference = $services.model.createDocumentReference($doc.wiki, 'XWiki', 'ClassSheet')) #if($services.sheet.getDocumentSheets($doc).contains($classSheetReference)) - {{include reference="" /}} + {{include reference="" author="target"/}} #end {{/velocity}}
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-36fm-j33w-c25fghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-32069ghsaADVISORY
- github.com/xwiki/xwiki-platform/commit/de72760d4a3e1e9be64a10660a0c19e9534e2ec4ghsax_refsource_MISCWEB
- github.com/xwiki/xwiki-platform/security/advisories/GHSA-36fm-j33w-c25fghsax_refsource_CONFIRMWEB
- jira.xwiki.org/browse/XWIKI-20566ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.