Learn about CVE-2023-35162, a critical cross-site scripting (XSS) vulnerability in XWiki Platform. Find out the impact, affected systems, and mitigation steps.
XPlatform Wiki is vulnerable to a critical cross-site scripting (XSS) attack via the xcontinue parameter in the preview actions template.
Understanding CVE-2023-35162
This CVE describes a security vulnerability in XWiki Platform that allows attackers to inject malicious JavaScript code via crafted URLs, leading to a cross-site scripting (XSS) attack.
What is CVE-2023-35162?
XWiki Platform, a generic wiki platform, is susceptible to a cross-site scripting (XSS) vulnerability due to improper neutralization of user input. Attackers can exploit the preview actions template to execute XSS attacks by manipulating the xcontinue parameter in URLs.
The Impact of CVE-2023-35162
The impact of this vulnerability is critical with a CVSS base score of 9.7 (Critical). It can result in high confidentiality, integrity, and availability impacts on affected systems.
Technical Details of CVE-2023-35162
This section provides specific technical details related to the CVE.
Vulnerability Description
Users can create malicious URLs with payloads to inject JavaScript code into XWiki pages, enabling attackers to execute XSS attacks via the xcontinue parameter. This vulnerability has been present in XWiki since version 6.1-rc-1.
Affected Systems and Versions
XWiki Platform versions >= 6.1-rc-1 and < 14.10.5, as well as versions >= 15.0-rc-1 and < 15.1-rc-1, are affected by this security issue.
Exploitation Mechanism
The exploitation of CVE-2023-35162 involves manipulating the xcontinue parameter in crafted URLs to execute malicious JavaScript code within XWiki pages, leading to XSS attacks.
Mitigation and Prevention
To address the CVE-2023-35162 vulnerability, immediate steps and long-term security practices should be implemented.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates