CVE-2023-35152

9.9 CRITICAL

📋 TL;DR

This vulnerability allows any logged-in XWiki user to inject malicious code into their first name field, which executes with programming rights. This leads to privilege escalation, potentially granting administrative access. Affects XWiki Platform versions 12.9-rc-1 through 14.4.7, 14.10.5, and 15.0.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: 12.9-rc-1 through 14.4.7, 14.10.5, and 15.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user authentication; any logged-in user can exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full administrative control over the XWiki instance, allowing data theft, system compromise, and lateral movement.

🟠

Likely Case

Privileged user escalates to administrator, modifies configurations, accesses sensitive data, or deploys backdoors.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to isolated account compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward via user profile editing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.4.8, 14.10.6, or 15.1

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-rf8j-q39g-7xfm

Restart Required: Yes

Instructions:

1. Backup your XWiki instance. 2. Upgrade to XWiki 14.4.8, 14.10.6, or 15.1. 3. Restart the application server.

🔧 Temporary Workarounds

Manual patch application

all

Apply the security patch from the GitHub commit to fix the vulnerability without full upgrade.

Apply changes from commit 0993a7ab3c102f9ac37ffe361a83a3dc302c0e45 to your XWiki installation.

🧯 If You Can't Patch

  • Restrict user profile editing permissions to administrators only.
  • Implement strict input validation and output encoding for user fields.

🔍 How to Verify

Check if Vulnerable:

Check XWiki version via Admin > About. If version is between 12.9-rc-1 and 14.4.7, 14.10.5, or 15.0, it's vulnerable.

Check Version:

Check Admin > About in XWiki web interface or inspect xwiki.properties file.

Verify Fix Applied:

After patching, verify version is 14.4.8, 14.10.6, or 15.1. Test by attempting to inject code in first name field.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user profile modifications, especially first name field changes containing script tags or code snippets.
  • Unexpected privilege escalation events in audit logs.

Network Indicators:

  • Suspicious POST requests to user profile update endpoints with encoded payloads.

SIEM Query:

Search for events where user.firstName field contains executable code patterns (e.g., <script>, ${...}).

🔗 References

📤 Share & Export