xwiki 漏洞列表
共找到 63 个与 xwiki 相关的漏洞
📅 加载漏洞趋势中...
-
XWiki Platform /rest/wikis/xwiki/pages 权限绕过漏洞(CVE-2025-29925) 无POC
XWiki平台是一个通用的维基平台。在15.10.14、16.4.6和16.10.0-rc-1之前,当请求REST端点/rest/wikis/[wikiName]/pages时,即使用户没有查看权限,受保护的页面也会被列出。当整个维基用"防止未注册用户查看页面"保护时,这一点尤其明显:该端点仍会列出维基的页面,但仅限于主维基。这个问题在XWiki 15.10.14、16.4.6、16.10.0RC1中得到了修复。在这些版本中,仍然可以请求该端点,但结果会根据页面的权限进行过滤。 -
XWiki /webjars 目录遍历漏洞(CVE-2025-55747) 无POC
XWiki Platform 是一个通用的 wiki 平台,为构建在其之上的应用程序提供运行时服务。在特定版本范围内存在一个漏洞,允许通过 webjars API 访问配置文件。 -
xwiki 路径遍历漏洞(CVE-2025-55747) 无POC
XWiki 平台是一个通用的 wiki 平台,为构建在其之上的应用程序提供运行时服务。在版本 6.1-milestone-2 到 16.10.6 中,可以通过webjars API 访问配置文件 -
XWiki 路径遍历漏洞(CVE-2025-55748) 无POC
在版本 4.2-milestone-2 到 16.10.6 中,配置文件可通过 jsx 和 sx 端点访问。可以 访问和读取配置文件。 -
xwiki CVE-2025-32969 sql注入 无POC
远程未经身份验证的用户可能会从 HQL 执行上下文中逃脱并执行盲 SQL 注入以在数据库后端执行任意 SQL语句,包括启用“阻止未注册用户查看页面,无论页面权限如何”和“阻止未注册用户编辑页面,无论页面权限如何”选项。根据所使用的数据库后端,攻击者不仅可以从数据库中获取密码哈希等机密信息,还可以执行 UPDATE/INSERT/DELETE 查询。 -
CVE-2022-24819: XWiki < 12.10.11, 13.4.4 & 13.9-rc-1 - Information Disclosure POC
An unauthenticated user can retrieve a list of users and their full names through a publicly accessible URL in XWiki. The issue affects versions before 12.10.11, 13.4.4, and 13.9-rc-1. -
CVE-2023-29204: XWiki - Open Redirect POC
XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1. -
CVE-2023-29506: XWiki >= 13.10.8 - Cross-Site Scripting POC
Reflected XSS vulnerability in XWiki authenticate endpoints allows execution of arbitrary JavaScript. -
CVE-2023-32068: XWiki - Open Redirect POC
XWiki Platform is vulnerable to open redirect attacks due to improper validation of the xredirect parameter. This allows an attacker to redirect users to an arbitrary website. The vulnerability is patched in versions 14.10.4 and 15.0. -
CVE-2023-35155: XWiki - Cross-Site Scripting POC
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). -
CVE-2023-35156: XWiki >= 6.0-rc-1 - Cross-Site Scripting POC
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the delete template to perform a XSS, e.g. by using URL such as: > xwiki/bin/get/FlamingoThemes/Cerulean?xpage=xpart&vm=delete.vm&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 6.0-rc-1. -
CVE-2023-35158: XWiki - Cross-Site Scripting POC
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the restore template to perform a XSS, e.g. by using URL such as: > /xwiki/bin/view/XWiki/Main?xpage=restore&showBatch=true&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 9.4-rc-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1. -
CVE-2023-35159: XWiki >= 3.4-milestone-1 - Cross-Site Scripting POC
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the deletespace template to perform a XSS, e.g. by using URL such as: > xwiki/bin/deletespace/Sandbox/?xredirect=javascript:alert(document.domain). -
CVE-2023-35160: XWiki >= 2.5-milestone-2 - Cross-Site Scripting POC
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the resubmit template to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/XWiki/Main xpage=resubmit&resubmit=javascript:alert(document.domain)&xback=javascript:alert(document.domain). This vulnerability exists since XWiki 2.5-milestone-2. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1. -
CVE-2023-35161: XWiki >= 6.2-milestone-1 - Cross-Site Scripting POC
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the DeleteApplication page to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 6.2-milestone-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1. -
CVE-2023-35162: XWiki < 14.10.5 - Cross-Site Scripting POC
XWiki Platform is vulnerable to reflected XSS via the previewactions template. An attacker can inject JavaScript through the xcontinue parameter. -
CVE-2023-37462: XWiki Platform - Remote Code Execution POC
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Improper escaping in the document `SkinsCode.XWikiSkinsSheet` leads to an injection vector from view right on that document to programming rights, or in other words, it is possible to execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The attack works by opening a non-existing page with a name crafted to contain a dangerous payload. It is possible to check if an existing installation is vulnerable -
CVE-2023-45136: XWiki < 14.10.14 - Cross-Site Scripting POC
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. When document names are validated according to a name strategy (disabled by default), XWiki starting in version 12.0-rc-1 and prior to versions 12.10.12 and 15.5-rc-1 is vulnerable to a reflected cross-site scripting attack in the page creation form. This allows an attacker to execute arbitrary actions with the rights of the user opening the malicious link. -
CVE-2023-46732: XWiki < 14.10.14 - Cross-Site Scripting POC
XWiki is vulnerable to reflected cross-site scripting (RXSS) via the rev parameter that is used in the content of the content menu without escaping. If an attacker can convince a user to visit a link with a crafted parameter, this allows the attacker to execute arbitrary actions in the name of the user, including remote code (Groovy) execution in the case of a user with programming right, compromising the confidentiality, integrity and availability of the whole XWiki installation. -
CVE-2023-48241: XWiki < 4.10.15 - Information Disclosure POC
The Solr-based search suggestion provider that also duplicates as generic JavaScript API for search results in XWiki exposes the content of all documents of all wikis to anybody who has access to it, by default it is public. This exposes all information stored in the wiki (but not some protected information like password hashes). While there is a right check normally, the right check can be circumvented by explicitly requesting fields from Solr that don't include the data for the right check. This can be reproduced by opening <xwiki-server>/xwiki/bin/get/XWiki/SuggestSolrService?outputSyntax=plain&media=json&nb=1000&query=q%3D*%3A*%0Aq.op%3DAND%0Afq%3Dtype%3ADOCUMENT%0Afl%3Dtitle_%2C+reference%2C+links%2C+doccontentraw_%2C+objcontent__&input=+ where <xwiki-server> is the URL of the XWiki installation. If this displays any results, the wiki is vulnerable. -
CVE-2023-50719: XWiki < 4.10.15 - Sensitive Information Disclosure POC
XWiki Platform is a generic wiki platform. Starting in 7.2-milestone-2 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the password hashes of all users to anyone with view right on the respective user profiles. By default, all user profiles are public. This vulnerability also affects any configurations used by extensions that contain passwords like API keys that are viewable for the attacker. Normally, such passwords aren't accessible but this vulnerability would disclose them as plain text. This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1. There are no known workarounds for this vulnerability. -
CVE-2023-50720: XWiki < 4.10.15 - Email Disclosure POC
The Solr-based search in XWiki discloses the email addresses of users even when obfuscation of email addresses is enabled. To demonstrate the vulnerability, search for objcontent:email* using XWiki's regular search interface. -
CVE-2024-21650: XWiki < 4.10.20 - Remote code execution POC
XWiki is vulnerable to a remote code execution (RCE) attack through its user registration feature. This issue allows an attacker to execute arbitrary code by crafting malicious payloads in the "first name" or "last name" fields during user registration. This impacts all installations that have user registration enabled for guests. -
CVE-2024-31982: XWiki < 4.10.20 - Remote code execution POC
XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki. -
CVE-2024-45591: XWiki Platform - Unauthorized Document History Access POC
A vulnerability in XWiki Platform's REST API allows unauthorized users to access document history information. The REST API endpoint exposes the history of any page including modification times, version numbers, author details (username and display name), and version comments, regardless of access rights configuration, even on private wikis. -
CVE-2025-24893: XWiki Platform - Remote Code Execution POC
Any guest can perform arbitrary remote code execution through a request to SolrSearch. This impacts the confidentiality, integrity, and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 15.10.11, 16.4.1, and 16.5.0RC1. -
CVE-2025-29925: XWiki REST API - Private Pages Disclosure POC
A vulnerability in XWiki's REST API allows unauthenticated users to access information about private pages through the pages endpoint. This could lead to disclosure of sensitive information and page metadata. -
CVE-2025-32430: XWiki Platform - Cross-Site Scripting POC
XWiki Platform versions >= 4.2-milestone-3 and < 16.4.8, >= 16.5.0-rc-1 and < 16.10.6, and >= 17.0.0-rc-1 and < 17.3.0-rc-1 are vulnerable to reflected XSS in two templates. The vulnerability allows an attacker to execute malicious JavaScript code in the context of the victim's session by getting the victim to visit an attacker-controlled URL. -
CVE-2025-32969: XWiki REST API Query - SQL Injection POC
A SQL injection vulnerability exists in XWiki's REST API query endpoint. An unauthenticated attacker can execute arbitrary SQL queries through the 'q' parameter by manipulating the HQL query, potentially leading to data exfiltration or system compromise. -
CVE-2025-32970: XWiki WYSIWYG API - Open Redirect POC
A vulnerability in XWiki's WYSIWYG API allows an attacker to redirect users to arbitrary external URLs through the xerror parameter. This could be used in phishing attacks to redirect users to malicious websites. -
CVE-2025-46554: XWiki REST API - Attachments Disclosure POC
A vulnerability in XWiki's REST API allows unauthenticated users to access attachments list and metadata through the attachments endpoint. This could lead to disclosure of sensitive information stored in attachments metadata. -
CVE-2025-54125: XWiki XML View - Sensitive Information Exposure POC
A vulnerability in XWiki's XML view functionality exposes sensitive information such as passwords and email addresses that are stored in custom fields not explicitly named as password or email. This information disclosure occurs when accessing user profiles with the xml.vm template. -
XWiki getdeleteddocuments.vm SQL注入漏洞 无POC
SQL注入漏洞是指攻击者通过在Web应用程序的输入字段中插入恶意SQL代码,从而绕过应用程序的安全措施,直接对数据库执行非法操作。这种漏洞通常发生在应用程序未对用户输入进行充分验证和过滤的情况下,使得攻击者能够获取、修改或删除数据库中的数据,甚至可能执行服务器上的任意代码。 -
XWiki Platform /bin/view/ 代码执行漏洞(CVE-2023-37462) 无POC
XWiki 平台是一个通用的 wiki 平台,为构建在其之上的应用程序提供运行时服务。文档 "SkinsCode.XWikiSkinsSheet" 中的转义不正确会导致从该文档上的视图到编程权限的注入向量,可以执行任意脚本宏,包括 Groovy 和 Python 宏,这些宏允许远程代码执行,包括对所有 wiki 内容的无限制读写访问。攻击者可以通过打开一个不存在的页面来实现,该页面的名称被精心设计为包含危险的有效载荷。可以检查现有安装是否存在漏洞。 -
XWiki SolrSearchMacros /bin/get/Main/SolrSearch 远程代码执行漏洞(CVE-2025-24893) 无POC
XWiki 是一个开源的企业级协作平台,提供丰富的功能和扩展性。XWiki SolrSearchMacros /bin/get/Main/SolrSearch 接口存在远程代码执行漏洞(CVE-2025-24893)。攻击者可以通过特制的 HTTP 请求利用该漏洞执行任意代码,进而控制服务器,导致敏感信息泄露或系统被完全接管。 -
XWiki history接口未授权访问(CVE-2024-45591) 无POC
Wiki Platform是一个通用的wiki平台。其RESTAPI会暴露XWiki中任何页面的历史记录,攻击者只要知道页面名称就能访问这些信息。暴露的信息包括页面的每次修改的修改时间、版本号、修改者(用户名和显示名称)以及版本注释。无论权限设置如何,甚至是当wiki被配置为完全私有时,这些信息也会被暴露。在一个私有的wiki中,可以通过访问/xwiki/rest/wikis/xwiki/spaces/Main/pages/WebHome/history来测试这一点,如果这显示了主页的历史记录,那么该安装就存在漏洞。这一漏洞已在XWiki15.10.9和XWiki 16.3.0RC1中得到修复。 -
XWiki SolrSearchMacros 远程代码执行漏洞复现(CVE-2025-24893) 无POC
XWiki 平台是一个通用的 wiki 平台,用户在构建应用程序提供运行时服务时。任何互联网用户都可以通过对 'SolrSearch'的请求来执行任意远程代码执行。这会影响整个 XWiki 安装的机密性、完整性和可用性。 -
XWiki XWikiRegister 远程代码执行漏洞 无POC
XWiki存在远程代码执行漏洞,此漏洞是由于XWikiRegister接口对用户的请求验证不当导致的。 -
XWiki Platform 未授权 代码注入漏洞 无POC
XWiki Platform 未授权 代码注入漏洞 -
XWiki /xwiki/bin/get/Main/DatabaseSearch 命令执行漏洞 无POC
攻击者可通过该漏洞在服务器端任意执行代码,写入后门,获取服务器权限,进而控制整个web服务器。 -
XWiki Platform CVE-2024-31982 远程代码执行漏洞 无POC
XWiki Platform 存在远程代码执行漏洞,此漏洞是程序对用户输入DatabaseSearch的数据缺乏校验导致的。 -
XWiki < 4.10.15 存在信息泄露漏洞(CVE-2023-48241) 无POC
XWiki平台是一个强大、灵活且可扩展的开源协作软件,用于创建和管理文档、知识库、任务列表等。XWiki < 4.10.15 存在信息泄露漏洞。 -
XWiki < 4.10.20 DatabaseSearch代码执行漏洞(CVE-2024-31982) 无POC
XWiki平台是一个强大、灵活且可扩展的开源协作软件,用于创建和管理文档、知识库、任务列表等。XWiki < 4.10.20存在代码执行漏洞,攻击者可以通过该漏洞执行任意代码,进而执行命令获取服务器权限。 -
XWiki.org XWiki导入栏反射型跨站脚本漏洞 无POC
在XWiki上发现了一个反射型跨站脚本漏洞,该漏洞是由于对导入栏视图的editor和section参数验证不充分造成的。 -
XWiki SearchAdmin CVE-2023-50721 命令注入漏洞 无POC
XWiki SearchAdmin存在命令注入漏洞。此漏洞是由于对ExtensionPointId等参数缺乏校验导致的。 -
XWiki Platform DatabaseSearch 远程代码执行漏洞 无POC
XWiki Platform是XWiki基金会的一套用于创建Web协作应用程序的Wiki平台。 XWiki Platform 存在安全漏洞,该漏洞源于 XWiki 的数据库搜索允许通过搜索文本远程执行代码。这允许公共 wiki 的任何访问者或封闭 wiki 的用户远程执行代码,因为默认情况下所有用户都可以访问数据库搜索。 -
XWiki Platform AdminSheet CVE-2023-46731远程代码执行漏洞 无POC
XWiki Platform存在远程代码执行漏洞,该漏洞是由于WebHome接口对用户请求的参数的值验证不当造成的。 -
XWiki Change Request CVE-2023-45138 跨站脚本漏洞 无POC
XWiki Change Request存在跨站脚本漏洞,该漏洞是由于接口对用户请求的crTitle参数的值验证不当导致的。 -
XWiki.org XWiki Tags.xml命令注入漏洞 无POC
XWiki存在一个命令注入漏洞。该漏洞是由于对标签值的验证不充分导致的。 -
XWiki.org XWiki deleteAttachment存储型XSS漏洞 无POC
XWiki存在存储型XSS漏洞。此漏洞是由于对删除的附件名校验不充分导致的。 -
XWiki.org XWiki moveStep1.vm 跨站脚本漏洞 无POC
-
XWiki.org XWiki MentionsMacro.xml 代码注入漏洞 无POC
-
XWiki.org XWiki XWikiServerClassSheet.xml 代码注入漏洞 无POC
-
XWiki.org XWiki filename参数存储型XSS漏洞 无POC
-
XWiki.org XWiki SchedulerJobSheet 代码注入漏洞 无POC
-
XWiki.org XWiki xwiki-platform-flamingo-theme-ui 远程代码执行漏洞 无POC
-
XWiki.org XWiki NotificationRSSService 代码注入漏洞 无POC
-
XWiki.org XWiki LegacyNotificationAdministration since 代码注入漏洞 无POC
-
XWiki.org XWiki AttachmentSelector docname 代码注入漏洞 无POC
-
XWiki TextAreaClass displayView代码注入漏洞 无POC
-
XWiki timezone 存储型跨站脚本漏洞 无POC
-
XWiki.org XWiki InvitationGuestActions 代码注入漏洞 无POC
-
XWiki 平台 SkinsCode.XWikiSkinsSheet文件存在命令执行(CVE-2023-37462) 无POC
XWiki 平台是一个通用的 wiki平台,为在其上构建的应用程序提供运行服务,文档“SkinsCode.XWikiSkinsSheet”中的不当转义会导致从该文档的视图到编程权限的注入向量,导致远程执行代码。