Learn about CVE-2023-50732 involving a Velocity execution vulnerability in XWiki-platform, impacting versions 8.3-rc-1 to 14.10.7 and 15.0-rc-1 to 15.2-rc-1. Find mitigation steps and security practices to address the issue.
This CVE record involves a Velocity execution vulnerability in XWiki-platform that allows execution without script right through a tree macro.
Understanding CVE-2023-50732
This vulnerability is assigned a CVSS base score of 8.3, indicating a High severity level due to incorrect authorization.
What is CVE-2023-50732?
The XWiki Platform, a generic wiki platform, allows the execution of a Velocity script without the required script right through the document tree. This issue has been addressed in versions XWiki 14.10.7 and 15.2RC1.
The Impact of CVE-2023-50732
The vulnerability poses a threat of unauthorized script execution and can potentially lead to data confidentiality, integrity, and availability risks within affected systems.
Technical Details of CVE-2023-50732
The vulnerability CVE-2023-50732 identified with CWE-863 (Incorrect Authorization) has the following technical details:
Vulnerability Description
The vulnerability allows the execution of Velocity scripts without the necessary script right permissions through the document tree in XWiki Platform.
Affected Systems and Versions
= 8.3-rc-1, < 14.10.7
= 15.0-rc-1, < 15.2-rc-1
Exploitation Mechanism
The exact exploitation mechanism of this vulnerability is unknown.
Mitigation and Prevention
To mitigate the risks associated with CVE-2023-50732, follow these practices:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Refer to the provided references for patching information and updates on XWiki-platform security: