XWiki Platform Mentions UI is a user interface for mentioning users in wiki content for XWiki Platform, a generic wiki platform. Starting in version 12.5-rc-1 and prior to versions 13.10.6 and 14.4, it's possible to store Javascript or groovy scripts in a mention, macro anchor, or reference field. The stored code is executed by anyone visiting the page with the mention. This issue has been patched on XWiki 14.4 and 13.10.6. As a workaround, one may update `XWiki.Mentions.MentionsMacro` and edit the `Macro code` field of the `XWiki.WikiMacroClass` XObject.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/xwiki/xwiki-platform/commit/4032dc896857597efd169966dc9e2752a9fdd459#diff-4fe22885f772e47d3561a05348f73921669ec12d4413b220383b73c7ae484bc4R608-R610 | Patch Third Party Advisory | 
| https://github.com/xwiki/xwiki-platform/commit/4f290d87a8355e967378a1ed6aee23a06ba162eb | Patch Third Party Advisory | 
| https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c5v8-2q4r-5w9v | Exploit Patch Third Party Advisory | 
| https://jira.xwiki.org/browse/XWIKI-19752 | Exploit Vendor Advisory | 
| https://github.com/xwiki/xwiki-platform/commit/4032dc896857597efd169966dc9e2752a9fdd459#diff-4fe22885f772e47d3561a05348f73921669ec12d4413b220383b73c7ae484bc4R608-R610 | Patch Third Party Advisory | 
| https://github.com/xwiki/xwiki-platform/commit/4f290d87a8355e967378a1ed6aee23a06ba162eb | Patch Third Party Advisory | 
| https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c5v8-2q4r-5w9v | Exploit Patch Third Party Advisory | 
| https://jira.xwiki.org/browse/XWIKI-19752 | Exploit Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 07:12
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/xwiki/xwiki-platform/commit/4032dc896857597efd169966dc9e2752a9fdd459#diff-4fe22885f772e47d3561a05348f73921669ec12d4413b220383b73c7ae484bc4R608-R610 - Patch, Third Party Advisory | |
| References | () https://github.com/xwiki/xwiki-platform/commit/4f290d87a8355e967378a1ed6aee23a06ba162eb - Patch, Third Party Advisory | |
| References | () https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c5v8-2q4r-5w9v - Exploit, Patch, Third Party Advisory | |
| References | () https://jira.xwiki.org/browse/XWIKI-19752 - Exploit, Vendor Advisory | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 8.9 | 
Information
                Published : 2022-09-08 21:15
Updated : 2024-11-21 07:12
NVD link : CVE-2022-36098
Mitre link : CVE-2022-36098
CVE.ORG link : CVE-2022-36098
JSON object : View
Products Affected
                xwiki
- xwiki
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
