CVE-2023-46243

9.9 CRITICAL

📋 TL;DR

This vulnerability in XWiki Platform allows authenticated users with edit rights to execute arbitrary Groovy code on the server by exploiting improper input validation in document editing URLs. The code executes with the permissions of the document's content author, potentially leading to server compromise. All XWiki installations below versions 14.10.6 and 15.2RC1 are affected.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: All versions below 14.10.6 and 15.2RC1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with edit rights on at least one document. The vulnerability is present in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover through remote code execution, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Unauthorized data access, privilege escalation, and modification of wiki content by authenticated attackers.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege principles are enforced, though code execution risk remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

The advisory includes a working exploit example. Attack requires authentication with edit permissions but is trivial to execute once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.10.6 or 15.2RC1

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g2qq-c5j9-5w5w

Restart Required: Yes

Instructions:

1. Backup your XWiki installation and database. 2. Download XWiki version 14.10.6 or 15.2RC1 from official sources. 3. Stop the XWiki service. 4. Replace the existing installation with the patched version. 5. Restart the XWiki service. 6. Verify the update was successful.

🔧 Temporary Workarounds

No known workarounds

all

The vendor advisory states there are no known workarounds for this vulnerability.

🧯 If You Can't Patch

  • Restrict edit permissions to only absolutely necessary trusted users
  • Implement network-level controls to limit access to XWiki from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check your XWiki version. If it's below 14.10.6 (for 14.x branch) or not 15.2RC1 (for 15.x branch), you are vulnerable.

Check Version:

Check the XWiki administration dashboard or examine the XWiki WAR file version.

Verify Fix Applied:

After patching, verify the version shows 14.10.6 or higher, or 15.2RC1 or higher. Test that the exploit URL no longer executes Groovy code.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Groovy script execution in logs
  • Multiple edit requests with encoded content parameters
  • Requests to /xwiki/bin/edit/ with content parameter containing {{groovy}}

Network Indicators:

  • HTTP requests with URL-encoded Groovy code in parameters
  • Patterns matching /xwiki/bin/edit//?content=%7B%7Bgroovy%7D%7D

SIEM Query:

url:"/xwiki/bin/edit/" AND (content:"{{groovy}}" OR content:"%7B%7Bgroovy%7D%7D")

🔗 References

📤 Share & Export