CVE-2022-29251

7.4 HIGH

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in XWiki Platform's Flamingo Theme UI. Attackers can inject malicious scripts via the 'newThemeName' form field, potentially compromising user sessions or performing unauthorized actions. Users running XWiki Platform versions 6.2.4 through 12.10.10, 13.0.0 through 13.4.6, or 13.5.0 through 13.10.2 are affected.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: 6.2.4 through 12.10.10, 13.0.0 through 13.4.6, 13.5.0 through 13.10.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations using Flamingo-based skins with the FlamingoThemesCode.WebHomeSheet page accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, perform account takeover, deface the wiki, or execute arbitrary actions as authenticated users.

🟠

Likely Case

Session hijacking, credential theft, or unauthorized content modification by tricking users into visiting malicious links.

🟢

If Mitigated

Limited impact with proper input validation and output encoding in place, though the vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (visiting malicious link) and access to the theme customization interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.10.11, 14.0-rc-1, 13.4.7, or 13.10.3

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vmhh-xh3g-j992

Restart Required: Yes

Instructions:

1. Identify your XWiki version. 2. Upgrade to patched version: 12.10.11, 14.0-rc-1, 13.4.7, or 13.10.3. 3. Restart XWiki service. 4. Verify fix by checking version.

🔧 Temporary Workarounds

Manual Wiki Page Edit

all

Edit the FlamingoThemesCode.WebHomeSheet wiki page to add proper input validation/sanitization as suggested in advisory.

Access wiki editor, navigate to FlamingoThemesCode.WebHomeSheet, apply security fixes from advisory

🧯 If You Can't Patch

  • Restrict access to FlamingoThemesCode.WebHomeSheet page to trusted administrators only
  • Implement web application firewall (WAF) rules to block XSS payloads in theme name parameters

🔍 How to Verify

Check if Vulnerable:

Check XWiki version against affected ranges. Verify if FlamingoThemesCode.WebHomeSheet page exists and contains vulnerable code.

Check Version:

Check XWiki administration panel or view page source for version information

Verify Fix Applied:

After patching, verify version is 12.10.11+, 14.0-rc-1+, 13.4.7+, or 13.10.3+. Test theme creation with XSS payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual theme creation/modification activity
  • Requests containing script tags in theme name parameters

Network Indicators:

  • HTTP requests with JavaScript payloads in 'newThemeName' parameter

SIEM Query:

web.url:*FlamingoThemesCode* AND (web.param:*<script>* OR web.param:*javascript:* OR web.param:*onerror=*)

🔗 References

📤 Share & Export