XWiki Platform is exposed to a Cross-site Scripting vulnerability allowing for malicious JavaScript execution through deleted attachments. Learn about the impact, technical details, and mitigation steps.
XWiki Platform is susceptible to a Cross-site Scripting (XSS) vulnerability in the Index UI of deleted attachments. Attackers could execute malicious JavaScript through deleted attachments views. This CVE affects xwiki-platform versions >= 2.2-milestone-1, < 13.10.6, and >= 14.0, < 14.3. The issue has been patched in versions 13.10.6 and 14.3. Users are advised to take immediate action to secure their systems.
Understanding CVE-2022-36096
XWiki Platform's vulnerability to Cross-site Scripting in the deleted attachments list.
What is CVE-2022-36096?
The XWiki Platform Index UI allows malicious JavaScript execution through deleted attachments, affecting versions prior to 13.10.6 and 14.3.
The Impact of CVE-2022-36096
With a CVSS base score of 8.9, this high-severity vulnerability exposes systems to confidentiality and integrity risks.
Technical Details of CVE-2022-36096
Insights into the vulnerability, affected systems, and exploitation methods.
Vulnerability Description
The flaw permits storing JavaScript in deleted attachments, leading to unauthorized script execution.
Affected Systems and Versions
xwiki-platform versions >= 2.2-milestone-1, < 13.10.6, and >= 14.0, < 14.3 are vulnerable to XSS attacks.
Exploitation Mechanism
By viewing deleted attachments, attackers can execute stored JavaScript code.
Mitigation and Prevention
Guidelines to address the vulnerability and enhance security measures.
Immediate Steps to Take
Edit 'XWiki.DeletedAttachments' to fix the issue and apply necessary changes from the fix commit.
Long-Term Security Practices
Regularly update XWiki Platform to the latest patched versions to safeguard against XSS attacks.
Patching and Updates
Ensure timely application of security patches to maintain system integrity and mitigate security risks.