CVE-2023-34467

7.5 HIGH

📋 TL;DR

This vulnerability in XWiki Platform allows attackers to retrieve email addresses of all users even when mail obfuscation is enabled. While emails appear obfuscated in the user interface, the underlying API responses contain unobfuscated data that can be filtered and sorted to infer email content. This affects XWiki installations with versions from 3.5-milestone-1 up to but excluding 14.4.8, 14.10.4, and 15.0-rc-1.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: 3.5-milestone-1 to 14.4.7, 14.10.3, and 14.10.x versions before 15.0-rc-1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all XWiki installations with mail obfuscation enabled (default configuration). The vulnerability exists in the platform itself, not dependent on specific plugins or extensions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all user email addresses leading to targeted phishing campaigns, spam attacks, and privacy violations against all registered users.

🟠

Likely Case

Unauthorized users harvesting email addresses for spam lists or targeted attacks against specific users.

🟢

If Mitigated

Limited exposure if email addresses are already public or if user base is small, but still violates privacy expectations.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only web access to the XWiki instance and basic understanding of API calls. No authentication needed as the vulnerability affects public API responses.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.4.8, 14.10.4, or 15.0-rc-1

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7vr7-cghh-ch63

Restart Required: Yes

Instructions:

1. Backup your XWiki instance. 2. Upgrade to XWiki 14.4.8, 14.10.4, or 15.0-rc-1. 3. Restart the XWiki application server. 4. Verify the fix by checking that email addresses are properly obfuscated in API responses.

🔧 Temporary Workarounds

Disable User Email Display

all

Temporarily disable display of user email addresses throughout the wiki

Edit XWiki configuration to remove email display from user profiles and listings

API Access Restriction

all

Restrict access to the vulnerable API endpoints

Configure web server or application firewall to block access to /rest/wikis/*/users endpoint

🧯 If You Can't Patch

  • Implement network-level restrictions to limit access to the XWiki instance to trusted users only
  • Monitor API access logs for unusual patterns of user data requests

🔍 How to Verify

Check if Vulnerable:

Access the REST API endpoint /rest/wikis/{wiki}/users and check if email addresses are visible in the response despite UI obfuscation

Check Version:

Check XWiki version in Administration → About section or via /xwiki/bin/view/Main/About

Verify Fix Applied:

After patching, verify that email addresses in REST API responses are properly obfuscated and match what's displayed in the UI

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests to user REST API endpoints
  • Patterns of filtering/sorting requests on user data

Network Indicators:

  • Unusual volume of requests to /rest/wikis/*/users endpoint
  • API calls with filter parameters targeting email fields

SIEM Query:

source="xwiki" AND (uri_path="/rest/wikis/*/users" OR uri_path LIKE "/rest/wikis/%/users") AND status=200

🔗 References

📤 Share & Export