Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) (CWE-80)
XWiki Platform, a generic wiki platform offering runtime services for applications, contains a vulnerability that allows the execution of JavaScript snippets on the side of another user with more rights. This is achieved by creating a conflict when the user with higher privileges is currently editing a page. The vulnerability can be reproduced when a user with admin rights edits a document without saving immediately. Then, another user with only edit rights on that specific document can change the entire content to a malicious script. When the admin user saves the document, a conflict popup appears, and if they select "Fix each conflict individually," the malicious script is executed.
This vulnerability compromises the confidentiality, integrity, and availability of the entire XWiki installation. The attack vector is network-based, requires low privileges and user interaction, but has a low attack complexity. The impact on confidentiality, integrity, and availability is high, and the scope is changed. With a CVSS v3.1 base score of 9.0, this vulnerability is considered critical. Potential attacks could lead to unauthorized access to sensitive information, manipulation of wiki content, and disruption of the XWiki service.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
This vulnerability has been patched. The fix is available in XWiki versions 15.10.8 and 16.3.0RC1 or later.
To mitigate this vulnerability, it is strongly recommended to update XWiki Platform to version 15.10.8 or 16.3.0RC1 or later. If immediate patching is not possible, consider implementing additional access controls, monitoring for suspicious editing conflicts, and restricting network access to the XWiki platform to trusted users only.
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
NVD published the first details for CVE-2024-41947
A CVSS base score of 9 has been assigned.
Feedly found the first article mentioning CVE-2024-41947. See article
Feedly estimated the CVSS score as HIGH
EPSS Score was set to: 0.05% (Percentile: 16.2%)
A CVSS base score of 5.4 has been assigned.