XWiki does not require right warnings for notification displayer objects
Moderate severity
GitHub Reviewed
Published
Jun 13, 2025
in
xwiki/xwiki-platform
•
Updated Jun 13, 2025
Package
Affected versions
>= 15.9-rc-1, < 15.10.16
>= 16.0.0-rc-1, < 16.4.7
>= 16.5.0-rc-1, < 16.10.2
Patched versions
15.10.16
16.4.7
16.10.2
Description
Published by the National Vulnerability Database
Jun 13, 2025
Published to the GitHub Advisory Database
Jun 13, 2025
Reviewed
Jun 13, 2025
Last updated
Jun 13, 2025
Impact
When a user without script right creates a document with an
XWiki.Notifications.Code.NotificationDisplayerClass
object, and later an admin edits and saves that document, the possibly malicious content of that object is output as raw HTML, allowing XSS attacks. While the notification displayer executes Velocity, the existing generic analyzer already warns admins before editing Velocity code. Note that warnings before editing documents with dangerous properties have only been introduced in XWiki 15.9, before that version, this was a known issue and the advice was simply to be careful.Patches
This vulnerability has been patched in XWiki 15.10.16, 16.4.7, and 16.10.2 by adding a required rights analyzer that warns the admin before editing about the possibly malicious code.
Workarounds
We're not aware of any real workarounds apart from just being careful with editing documents previously edited by untrusted users as a user with script, admin or programming right.
References