CVE-2023-26480

8.9 HIGH

📋 TL;DR

This CVE allows users without script rights to perform stored cross-site scripting (XSS) attacks via the Live Data macro in XWiki Platform. Attackers can inject malicious scripts that execute when other users view affected pages. All XWiki installations running vulnerable versions are affected.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: 12.10 to 14.8, 14.4.0 to 14.4.6, 13.10.0 to 13.10.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Live Data macro feature to be enabled and accessible to users without script rights.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, deface content, or redirect users to malicious sites, potentially leading to account compromise and data theft.

🟠

Likely Case

Attackers with user accounts can inject malicious scripts that execute when other users view pages containing the Live Data macro, potentially stealing session data or performing unauthorized actions.

🟢

If Mitigated

With proper input validation and output encoding, the impact is limited to content manipulation within the user's own privilege scope.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a user account but no special script rights. The vulnerability is in the Live Data macro's handling of user input.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.9, 14.4.7, or 13.10.10

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-32fq-m2q5-h83g

Restart Required: Yes

Instructions:

1. Backup your XWiki installation and database. 2. Download the patched version (14.9, 14.4.7, or 13.10.10). 3. Follow XWiki's upgrade documentation for your specific version. 4. Restart the application server. 5. Verify the fix by checking the version.

🔧 Temporary Workarounds

No workarounds available

all

The vendor advisory states there are no known workarounds for this vulnerability.

🧯 If You Can't Patch

  • Restrict access to the Live Data macro for users without script rights through permission settings
  • Implement web application firewall (WAF) rules to detect and block XSS payloads in Live Data macro parameters

🔍 How to Verify

Check if Vulnerable:

Check your XWiki version. If it's between 12.10-14.8, 14.4.0-14.4.6, or 13.10.0-13.10.9, you are vulnerable.

Check Version:

Check the XWiki administration panel or view the page source for version information in the footer.

Verify Fix Applied:

After patching, verify the version is 14.9, 14.4.7, 13.10.10 or higher, and test that the Live Data macro properly sanitizes user input.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Live Data macro usage patterns
  • Multiple failed script execution attempts in logs

Network Indicators:

  • Unexpected script tags in Live Data macro requests/responses

SIEM Query:

Search for patterns like '<script>' or 'javascript:' in Live Data macro parameters in web server logs

🔗 References

📤 Share & Export