CVE-2023-50723

9.9 CRITICAL

📋 TL;DR

This vulnerability in XWiki Platform allows any user who can edit a wiki page to gain programming rights through missing escaping in administration interface code. This enables privilege escalation to full system control, affecting all XWiki installations with users who can edit pages (including their own profiles). The vulnerability impacts confidentiality, integrity, and availability of the entire XWiki installation.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: Starting from version 2.3 up to but excluding 14.10.15, 15.5.2, and 15.7-rc-1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All users can typically edit their own user profiles by default, making this exploitable by all authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the XWiki instance allowing attackers to execute arbitrary code, access/modify all data, and potentially pivot to underlying infrastructure.

🟠

Likely Case

Privileged users or attackers who gain edit access can escalate to programming rights, leading to data theft, content manipulation, and service disruption.

🟢

If Mitigated

If proper access controls limit page editing to trusted users only, impact is reduced but still significant for authorized users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user with page editing permissions, which most users have by default for their profiles.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.10.15, 15.5.2, or 15.7RC1

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qj86-p74r-7wp5

Restart Required: Yes

Instructions:

1. Upgrade to XWiki 14.10.15, 15.5.2, or 15.7RC1. 2. Alternatively, manually apply patches to XWiki.ConfigurableClassMacros and XWiki.ConfigurableClass pages as referenced in the advisory. 3. Restart the XWiki service.

🔧 Temporary Workarounds

Restrict page editing permissions

all

Temporarily restrict edit permissions on all wiki pages to only trusted administrators

Use XWiki administration interface to modify page permissions globally

Disable user profile editing

all

Remove edit permissions from user profile pages to prevent exploitation via default attack vector

Modify rights for XWiki.XWikiUsers and user profile pages to remove edit permissions

🧯 If You Can't Patch

  • Implement strict access controls to limit page editing to essential administrators only
  • Monitor and audit all page edit activities for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check XWiki version via administration interface or by examining the installation directory. Versions between 2.3 and below 14.10.15, 15.5.2, or 15.7RC1 are vulnerable.

Check Version:

Check XWiki administration dashboard or examine xwiki.properties file for version information

Verify Fix Applied:

Verify version is 14.10.15, 15.5.2, or 15.7RC1 or higher. Check that patches have been applied to XWiki.ConfigurableClassMacros and XWiki.ConfigurableClass pages.

📡 Detection & Monitoring

Log Indicators:

  • Unusual page edit activities, especially to administration-related pages
  • Multiple failed privilege escalation attempts
  • Unexpected programming rights assignments

Network Indicators:

  • Unusual API calls to page editing endpoints
  • Suspicious requests to administration interfaces

SIEM Query:

source="xwiki" AND (event="page_edit" AND target_page="*Configurable*") OR (event="privilege_change" AND new_right="programming")

🔗 References

📤 Share & Export