XPlatform Wiki vulnerable to cross-site scripting via xcontinue parameter in preview actions template
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the previewactions template to perform a XSS, e.g. by using URL such as: > <hostname>/xwiki/bin/get/FlamingoThemes/Cerulean xpage=xpart&vm=previewactions.vm&xcontinue=javascript:alert(document.domain). This vulnerability exists since XWiki 6.1-rc-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.xwiki.platform:xwiki-platform-flamingo-skin-resourcesMaven | >= 6.1-rc-1, < 14.10.5 | 14.10.5 |
org.xwiki.platform:xwiki-platform-flamingo-skin-resourcesMaven | >= 15.0-rc-1, < 15.1-rc-1 | 15.1-rc-1 |
Affected products
1- Range: >= 6.1-rc-1, < 14.10.5
Patches
19f01166b1a8eXWIKI-20342: Sanitize template URLs
1 file changed · +4 −1
xwiki-platform-core/xwiki-platform-flamingo/xwiki-platform-flamingo-skin/xwiki-platform-flamingo-skin-resources/src/main/resources/flamingo/previewactions.vm+4 −1 modified@@ -45,7 +45,10 @@ #end #end #end -<form id="backtoedit" class="buttons" action="$!{escapetool.xml($editorUrl)}" method="post"> + ## We use the wiki editor as fallback url since it's the one supposed to work in all conditions. + #set ($fallbackUrl = $tdoc.getURL("edit", "editor=wiki&$docvariant")) + #getSanitizedURLAttributeValue('form','action',$editorUrl, $fallbackUrl, $finalEditorUrl) +<form id="backtoedit" class="buttons" action="$finalEditorUrl" method="post"> <div> #foreach($param in $request.getParameterNames()) #if(!$param.startsWith('action_'))
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- github.com/advisories/GHSA-q9hg-9qj2-mxf9ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-35162ghsaADVISORY
- github.com/xwiki/xwiki-platform/commit/9f01166b1a8ee9639666099eb5040302df067e4dghsax_refsource_MISCWEB
- github.com/xwiki/xwiki-platform/security/advisories/GHSA-q9hg-9qj2-mxf9ghsax_refsource_CONFIRMWEB
- jira.xwiki.org/browse/XWIKI-20342ghsax_refsource_MISCWEB
- jira.xwiki.org/browse/XWIKI-20583ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.