CVE-2024-31986

9.0 CRITICAL

📋 TL;DR

This vulnerability allows remote code execution on XWiki servers through crafted document references. Attackers can execute arbitrary code when an administrator visits the scheduler page or when that page is referenced elsewhere in the wiki. All XWiki installations between versions 3.1 and 14.10.18, 15.5.3, and 15.9 are affected.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: 3.1 through 14.10.18, 15.5.3, and 15.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All XWiki installations within affected version ranges are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise allowing attacker to execute arbitrary code, access sensitive data, modify content, and potentially pivot to other systems.

🟠

Likely Case

Server compromise leading to data theft, content manipulation, and installation of backdoors or malware.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are in place to detect exploitation attempts.

🌐 Internet-Facing: HIGH - Exploitation can be triggered remotely through crafted content without authentication.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires creating a document with specific crafted references, which can be done by any user with edit permissions. Trigger requires admin visit to scheduler page or page reference.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.10.19, 15.5.5, and 15.10-rc-1

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-37m4-hqxv-w26g

Restart Required: Yes

Instructions:

1. Upgrade to XWiki 14.10.19, 15.5.5, or 15.10-rc-1. 2. Restart the XWiki application server. 3. Verify the patch is applied by checking version.

🔧 Temporary Workarounds

Manual patch application

all

Modify the Scheduler.WebHome page to remove the vulnerability as described in the advisory

Edit Scheduler.WebHome page content as per commit 8a92cb4bef7e5f244ae81eed3e64fe9be95827cf

🧯 If You Can't Patch

  • Restrict access to scheduler page using web application firewall rules or access controls
  • Disable document editing for non-administrative users and monitor for suspicious document creation

🔍 How to Verify

Check if Vulnerable:

Check XWiki version against affected ranges: 3.1-14.10.18, 15.5.3, or 15.9

Check Version:

Check XWiki administration panel or view /xwiki/bin/view/Main/About

Verify Fix Applied:

Verify version is 14.10.19, 15.5.5, or 15.10-rc-1 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual document creation with XWiki.SchedulerJobClass objects
  • Multiple failed access attempts to scheduler page
  • Unexpected process execution from XWiki context

Network Indicators:

  • Unusual outbound connections from XWiki server
  • Traffic patterns indicating command and control

SIEM Query:

source="xwiki" AND (event="document_creation" AND object_type="XWiki.SchedulerJobClass") OR (url_path="/xwiki/bin/view/Scheduler/" AND status="200")

🔗 References

📤 Share & Export