Wiki.js versions prior to 2.5.276 are prone to improper write access, enabling users to update pages outside allowed paths. Learn about the impact, technical details, and mitigation steps.
Wiki.js, a wiki app built on Node.js, is affected by a vulnerability that allows an authenticated user with write access to update a page outside the allowed paths. The issue arises due to incorrect path access control, enabling users to manipulate the target page ID. This CVE has a CVSS base score of 8.1 (High severity).
Understanding CVE-2022-23654
This CVE highlights an improper write access check vulnerability in Requarks/wiki.
What is CVE-2022-23654?
The flaw in Wiki.js versions prior to 2.5.276 allows authorized users to modify pages beyond their restricted paths by specifying a different page ID.
The Impact of CVE-2022-23654
The vulnerability poses a high risk of unauthorized data access, integrity compromise, and confidentiality breaches.
Technical Details of CVE-2022-23654
The following technical aspects are associated with CVE-2022-23654:
Vulnerability Description
An authenticated user can update pages outside the permitted paths by manipulating the page ID.
Affected Systems and Versions
Product: wiki Vendor: Requarks Versions Affected: < 2.5.276
Exploitation Mechanism
By specifying a different target page ID while keeping the path intact, users can bypass access control checks.
Mitigation and Prevention
To address CVE-2022-23654, users and administrators can take the following actions:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security advisories and apply patches promptly to protect your system from known vulnerabilities.