CVE-2023-30537

9.9 CRITICAL

📋 TL;DR

CVE-2023-30537 is a critical remote code execution vulnerability in XWiki Platform that allows authenticated users with object creation rights to execute arbitrary Groovy, Python, or Velocity code. This leads to complete compromise of the XWiki installation. All XWiki instances with default configurations running vulnerable versions are affected.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: All versions before 13.10.11, 14.4.7, and 14.10
Operating Systems: All platforms running XWiki
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable FlamingoThemesCode.WebHome page is installed by default. Any user with 'Add Object' permission on any page can exploit this.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary code, access sensitive data, modify content, and potentially pivot to other systems in the network.

🟠

Likely Case

Authenticated attackers gaining administrative privileges, stealing sensitive data, and maintaining persistent access to the XWiki instance.

🟢

If Mitigated

Limited impact if proper access controls restrict object creation rights to trusted users only, though the vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with object creation rights. The vulnerability is in a default component making exploitation straightforward for attackers with valid credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 13.10.11, 14.4.7, or 14.10

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vrr8-fp7c-7qgp

Restart Required: Yes

Instructions:

1. Identify your XWiki version. 2. Upgrade to 13.10.11, 14.4.7, or 14.10 depending on your current version track. 3. Restart the XWiki application server. 4. Verify the patch is applied by checking the version.

🔧 Temporary Workarounds

Restrict Object Creation Permissions

all

Temporarily limit 'Add Object' permissions to only essential administrators until patching can be completed.

Navigate to XWiki Administration > Rights > Page Rights and restrict 'Add Object' permission globally and on specific spaces

Remove FlamingoThemesCode.WebHome Page

all

Delete or restrict access to the vulnerable page if not needed for functionality.

Access XWiki and delete page 'FlamingoThemesCode.WebHome' or modify its permissions to prevent access

🧯 If You Can't Patch

  • Immediately restrict 'Add Object' permissions to only absolutely necessary trusted administrators
  • Implement network segmentation to isolate XWiki instances from critical systems and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check XWiki version via Administration > About or by examining the XWiki WAR file. Versions before 13.10.11, 14.4.7, and 14.10 are vulnerable.

Check Version:

Check XWiki web interface at /xwiki/bin/view/Admin/About or examine xwiki-platform-core version in META-INF/MANIFEST.MF

Verify Fix Applied:

After upgrade, verify version shows 13.10.11, 14.4.7, or 14.10 in Administration > About. Test that object creation still works but code execution is prevented.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Groovy/Python/Velocity code execution in logs
  • Multiple object creation attempts by single users
  • Access to FlamingoThemesCode.WebHome with POST requests

Network Indicators:

  • POST requests to pages with object creation containing script code
  • Unusual outbound connections from XWiki server

SIEM Query:

source="xwiki.log" AND ("Groovy" OR "Python" OR "Velocity") AND "execution" AND NOT "expected_script"

🔗 References

📤 Share & Export