Skip to main content

CVE-2021-32732: CWE-352: Cross-Site Request Forgery (CSRF) in xwiki xwiki-platform

Medium
Published: Fri Feb 04 2022 (02/04/2022, 22:15:13 UTC)
Source: CVE
Vendor/Project: xwiki
Product: xwiki-platform

Description

### Impact It's possible to know if a user has or not an account in a wiki related to an email address, and which username(s) is actually tied to that email by forging a request to the Forgot username page. Note that since this page does not have a CSRF check it's quite easy to perform a lot of those requests. ### Patches This issue has been patched in XWiki 12.10.5 and 13.2RC1. Two different patches are provided: - a first one to fix the CSRF problem - a more complex one that now relies on sending an email for the Forgot username process. ### Workarounds It's possible to fix the problem without uprading by editing the ForgotUsername page in version below 13.x, to use the following code: https://github.com/xwiki/xwiki-platform/blob/69548c0320cbd772540cf4668743e69f879812cf/xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-ui/src/main/resources/XWiki/ForgotUsername.xml#L39-L123 In version after 13.x it's also possible to edit manually the forgotusername.vm file, but it's really encouraged to upgrade the version here. ### References * https://jira.xwiki.org/browse/XWIKI-18384 * https://jira.xwiki.org/browse/XWIKI-18408 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [security ML](mailto:security@xwiki.org)

AI-Powered Analysis

AILast updated: 06/22/2025, 04:36:16 UTC

Technical Analysis

CVE-2021-32732 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the xwiki-platform, an open-source wiki and collaboration platform widely used for knowledge management and documentation. The vulnerability exists in the 'Forgot username' functionality of the platform, where an attacker can forge HTTP requests to the Forgot username page without any CSRF protection mechanisms in place. This allows an attacker to determine whether a given email address is associated with an account on the wiki and to enumerate usernames tied to that email. The lack of CSRF tokens or other anti-CSRF controls means that automated, repeated requests can be made easily, enabling large-scale enumeration attacks. This information disclosure can facilitate further targeted attacks such as phishing or social engineering. The vulnerability affects xwiki-platform versions prior to 12.10.5 and versions from 13.0 up to but not including 13.2RC1. The vendor has released two patches: one to add CSRF protection and another to enhance the Forgot username process by requiring email verification, thus mitigating the risk of automated enumeration. Workarounds include manually editing the ForgotUsername page or the forgotusername.vm file to implement CSRF protections, but upgrading to patched versions is strongly recommended. No known exploits have been reported in the wild to date. The vulnerability is classified under CWE-352 (Cross-Site Request Forgery).

Potential Impact

For European organizations using xwiki-platform, this vulnerability poses a moderate risk primarily related to information disclosure and user privacy. Attackers can leverage the flaw to enumerate valid user accounts linked to email addresses, which can be used to craft targeted phishing campaigns or social engineering attacks, potentially leading to credential theft or unauthorized access. While the vulnerability does not directly allow account takeover or system compromise, the exposure of user information undermines confidentiality and can facilitate subsequent attacks. Organizations with sensitive or regulated data, such as government agencies, healthcare, or financial institutions, may face compliance and reputational risks if user data is exposed. The ease of exploitation—requiring no authentication and no user interaction beyond visiting a malicious page—means that attackers can automate reconnaissance at scale. However, the impact on system integrity and availability is low, as the vulnerability does not allow modification or disruption of services. Overall, the threat is significant for organizations relying on xwiki-platform for internal or external collaboration, especially where user privacy is critical.

Mitigation Recommendations

1. Upgrade xwiki-platform to version 12.10.5 or later, or 13.2RC1 or later, where the vulnerability is fully patched. 2. If immediate upgrade is not feasible, manually apply the workaround by editing the ForgotUsername page as per the vendor's recommended code changes to add CSRF protection. For versions after 13.x, modify the forgotusername.vm file to implement CSRF tokens or similar anti-CSRF mechanisms. 3. Implement web application firewall (WAF) rules to detect and block suspicious repeated requests to the Forgot username endpoint, limiting automated enumeration attempts. 4. Monitor logs for unusual activity targeting the Forgot username functionality, such as high volumes of requests from single IP addresses or unusual user-agent strings. 5. Educate users about phishing risks, especially if their usernames or emails could be exposed, and encourage strong, unique passwords and multi-factor authentication where possible. 6. Review and tighten email verification and notification processes related to account recovery to detect and alert on suspicious activity. 7. Conduct regular security assessments and penetration tests focusing on user enumeration and CSRF vulnerabilities to ensure no regressions occur.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2021-05-12T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9848c4522896dcbf60b6

Added to database: 5/21/2025, 9:09:28 AM

Last enriched: 6/22/2025, 4:36:16 AM

Last updated: 8/3/2025, 4:08:30 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats