CVE-2023-36471

9.0 CRITICAL

📋 TL;DR

XWiki Commons HTML sanitizer vulnerability allows attackers without script rights to create phishing forms or embed malicious inputs that could lead to remote code execution when submitted by administrators. This affects XWiki installations from version 14.6RC1 to before 14.10.6 and 15.2RC1. The vulnerability enables privilege escalation from low-privileged users to potentially full system compromise.

💻 Affected Systems

Products:
  • XWiki Commons
  • XWiki Platform
Versions: 14.6RC1 to 14.10.5, and 15.0.0 to 15.1.0
Operating Systems: All platforms running XWiki
Default Config Vulnerable: ⚠️ Yes
Notes: All XWiki installations using the vulnerable HTML sanitizer component are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Phishing attacks against users or privilege escalation allowing attackers to execute arbitrary code with admin privileges.

🟢

If Mitigated

Limited to phishing attempts if proper input validation and user awareness are in place, but RCE risk remains if admins interact with malicious content.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires attacker to have edit rights (but not script rights) and needs admin interaction with crafted content. Public advisory includes exploit details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.10.6 or 15.2RC1

Vendor Advisory: https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-6pqf-c99p-758v

Restart Required: Yes

Instructions:

1. Backup your XWiki instance. 2. Download and install XWiki 14.10.6 or 15.2RC1 from official sources. 3. Follow XWiki upgrade documentation. 4. Restart the application server. 5. Verify the fix by checking version and testing sanitizer functionality.

🔧 Temporary Workarounds

Manual configuration workaround

all

Add form-related tags to the forbidden tags list in xwiki.properties configuration

Edit xwiki.properties and add: xml.htmlElementSanitizer.forbidTags = form, input, select, textarea, button

🧯 If You Can't Patch

  • Implement the manual configuration workaround immediately
  • Restrict edit permissions to trusted users only and monitor for suspicious form/input tag usage

🔍 How to Verify

Check if Vulnerable:

Check XWiki version: if between 14.6RC1-14.10.5 or 15.0.0-15.1.0, you are vulnerable. Also check if form/input tags are allowed in HTML sanitizer.

Check Version:

Check XWiki administration panel or view xwiki.cfg/xwiki.properties for version information

Verify Fix Applied:

After upgrade to 14.10.6+ or 15.2RC1+, verify version and test that form/input tags are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual form submissions from non-admin users
  • HTML content containing form/input tags in user edits
  • Groovy code execution in unexpected contexts

Network Indicators:

  • Unusual POST requests to edit endpoints
  • Requests containing crafted HTML with form elements

SIEM Query:

Search for: 'form' OR 'input' OR 'textarea' in user-generated content logs AND (version contains '14.6' to '14.10.5' OR '15.0' to '15.1')

🔗 References

📤 Share & Export