CVE-2023-29514

9.9 CRITICAL

📋 TL;DR

CVE-2023-29514 is a critical remote code execution vulnerability in XWiki Platform where any user with document edit rights can execute arbitrary code with programming rights. This affects all XWiki installations with users who have edit permissions. The vulnerability allows complete system compromise.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: All versions before 13.10.11, 14.4.8, 14.10.1, and 15.0 RC1
Operating Systems: All operating systems running XWiki
Default Config Vulnerable: ⚠️ Yes
Notes: Any XWiki installation where users have edit rights on documents (including their own user profiles) is vulnerable. This includes most standard configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover: attacker gains full control of the server, can steal data, install malware, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Data theft and system compromise: attackers will likely exfiltrate sensitive data, install backdoors, and potentially use the system for further attacks.

🟢

If Mitigated

Limited impact if only trusted users have edit rights, but still significant risk from insider threats or compromised accounts.

🌐 Internet-Facing: HIGH - Any internet-facing XWiki instance is immediately vulnerable to exploitation by authenticated users.
🏢 Internal Only: HIGH - Internal systems are equally vulnerable to both malicious insiders and attackers who gain access through other means.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user with edit rights, but the vulnerability is straightforward to exploit once authenticated. The advisory provides technical details that could be used to create exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 13.10.11, 14.4.8, 14.10.1, or 15.0 RC1

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9j36-3cp4-rh4j

Restart Required: Yes

Instructions:

1. Backup your XWiki installation and database. 2. Download the patched version from xwiki.org. 3. Stop the XWiki service. 4. Replace the installation with the patched version. 5. Restart the XWiki service. 6. Verify the version is updated.

🧯 If You Can't Patch

  • Immediately revoke all edit rights from non-administrative users
  • Disable XWiki instance entirely until patching is possible

🔍 How to Verify

Check if Vulnerable:

Check XWiki version via Admin interface or by examining the installation directory. If version is below 13.10.11, 14.4.8, 14.10.1, or not 15.0 RC1 or higher, it's vulnerable.

Check Version:

Check XWiki Admin dashboard or examine the WEB-INF/xwiki.properties file for version information.

Verify Fix Applied:

After patching, verify the version shows 13.10.11, 14.4.8, 14.10.1, or 15.0 RC1 or higher in the Admin interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual document edits by non-admin users
  • Execution of scripting commands in document saves
  • Unexpected system commands being executed

Network Indicators:

  • Unusual outbound connections from XWiki server
  • Data exfiltration patterns

SIEM Query:

source="xwiki.log" AND ("script execution" OR "programming rights" OR "groovy" OR "velocity") AND user!="admin"

🔗 References

📤 Share & Export