XWiki Platform vulnerable to reflected cross-site scripting via back and xcontinue parameters in resubmit template
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the resubmit template to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/XWiki/Main xpage=resubmit&resubmit=javascript:alert(document.domain)&xback=javascript:alert(document.domain). This vulnerability exists since XWiki 2.5-milestone-2. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.xwiki.platform:xwiki-platform-web-templatesMaven | >= 2.5-milestone-2, < 14.10.5 | 14.10.5 |
org.xwiki.platform:xwiki-platform-web-templatesMaven | >= 15.0-rc-1, < 15.1-rc-1 | 15.1-rc-1 |
Affected products
1- Range: >= 2.5-milestone-2, < 14.10.5
Patches
1dbc92dcdace3XWIKI-20343: Sanitize template URLs
1 file changed · +2 −2
xwiki-platform-core/xwiki-platform-web/xwiki-platform-web-templates/src/main/resources/templates/resubmit.vm+2 −2 modified@@ -29,8 +29,8 @@ $response.addHeader( "X-FRAME-OPTIONS", "DENY" ) <div class="main layoutsubsection"> <div id="mainContentArea"> #xwikimessageboxstart($services.localization.render('warning') $services.localization.render('csrf.confirmation')) -#set($resubmit = "$!{escapetool.xml($request.getParameter('resubmit'))}") -#set($xback = "$!{escapetool.xml($request.getParameter('xback'))}") +#getSanitizedURLAttributeValue('form','action', $request.getParameter('resubmit'), '', $resubmit) +#getSanitizedURLAttributeValue('a','href', $request.getParameter('xback'), $doc.getURL(), $xback) <form action="$resubmit" method="post"> <div class="hidden"> ## Valid CSRF token
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- github.com/advisories/GHSA-r8xc-xxh3-q5x3ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-35160ghsaADVISORY
- github.com/xwiki/xwiki-platform/commit/dbc92dcdace33823ffd1e1591617006cb5fc6a7fghsax_refsource_MISCWEB
- github.com/xwiki/xwiki-platform/security/advisories/GHSA-r8xc-xxh3-q5x3ghsax_refsource_CONFIRMWEB
- jira.xwiki.org/browse/XWIKI-20343ghsax_refsource_MISCWEB
- jira.xwiki.org/browse/XWIKI-20583ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.