CVE-2026-24128

6.1 MEDIUM

📋 TL;DR

This reflected XSS vulnerability in XWiki Platform allows attackers to craft malicious URLs that execute arbitrary JavaScript in victims' browsers. If victims have administrative or programming rights, attackers can gain full control of the XWiki installation. Affected versions include 7.0-milestone-2 through 16.10.11, 17.0.0-rc-1 through 17.4.4, and 17.5.0-rc-1 through 17.7.0.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: 7.0-milestone-2 through 16.10.11, 17.0.0-rc-1 through 17.4.4, 17.5.0-rc-1 through 17.7.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All XWiki installations using affected versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of XWiki installation with administrative privileges, allowing data theft, system takeover, and lateral movement.

🟠

Likely Case

Session hijacking, credential theft, and privilege escalation for authenticated users.

🟢

If Mitigated

Limited impact if victims have minimal privileges and proper input validation is enforced elsewhere.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly weaponized. Attack requires victim to click malicious link.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.10.12, 17.4.5, 17.8.0-rc-1

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-wvqx-m5px-6cmp

Restart Required: No

Instructions:

1. Upgrade to patched version: 16.10.12, 17.4.5, or 17.8.0-rc-1. 2. Apply manual patch to templates/logging_macros.vm if upgrading not possible.

🔧 Temporary Workarounds

Manual template patch

all

Apply single-line fix to templates/logging_macros.vm file as shown in GitHub commit.

Edit templates/logging_macros.vm and apply fix from: https://github.com/xwiki/xwiki-platform/commit/8337ac8c3b19c37f306723b638b2cae8b0a57dbf

🧯 If You Can't Patch

  • Implement WAF rules to block XSS payloads in URLs
  • Restrict user privileges to minimize impact if exploited

🔍 How to Verify

Check if Vulnerable:

Check XWiki version against affected ranges. Test for XSS in logging templates.

Check Version:

Check XWiki administration panel or xwiki.cfg file for version.

Verify Fix Applied:

Verify version is 16.10.12, 17.4.5, or 17.8.0-rc-1+. Test that XSS payloads no longer execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL parameters with script tags or JavaScript in access logs
  • Multiple failed XSS attempts

Network Indicators:

  • HTTP requests containing XSS payloads in URL parameters

SIEM Query:

url:*script* OR url:*javascript* OR url:*onerror* OR url:*onload*

🔗 References

📤 Share & Export