Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-43841: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in xwiki xwiki-platform

0
Medium
Published: Fri Feb 04 2022 (02/04/2022, 22:30:14 UTC)
Source: CVE
Vendor/Project: xwiki
Product: xwiki-platform

Description

XWiki is a generic wiki platform offering runtime services for applications built on top of it. When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file. This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser. Users are advised to update or to disallow uploads of SVG files.

AI-Powered Analysis

AILast updated: 06/22/2025, 04:22:21 UTC

Technical Analysis

CVE-2021-43841 is a cross-site scripting (XSS) vulnerability identified in the XWiki platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). Specifically, when using the default configuration of XWiki, an attacker can upload an SVG (Scalable Vector Graphics) file containing embedded malicious scripts. These scripts are executed when a user performs the download action on the SVG file, leading to potential client-side code execution within the context of the victim's browser session. The root cause is that the platform allowed SVG files to be displayed in the browser without sufficient sanitization or restrictions on embedded scripts. This flaw affects versions of XWiki platform prior to 12.10.6 and versions from 13.0 up to but not including 13.3RC1. The vulnerability has been addressed by patching the platform so that the default configuration no longer permits SVG files to be rendered directly in the browser, effectively mitigating the risk of script execution. Users are advised to update to patched versions or alternatively disallow SVG file uploads altogether to prevent exploitation. No known exploits have been reported in the wild to date, but the vulnerability presents a medium severity risk due to the potential for client-side attacks such as session hijacking, phishing, or defacement through malicious script execution within trusted domains.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for entities that rely on XWiki for internal knowledge management, collaboration, or application runtime services. Successful exploitation could allow attackers to execute arbitrary JavaScript in the context of authenticated users, potentially leading to theft of session tokens, unauthorized actions, or distribution of malware via trusted internal portals. This could compromise confidentiality and integrity of sensitive organizational data and disrupt availability if malicious scripts perform destructive actions or propagate further attacks. Sectors such as government agencies, financial institutions, research organizations, and large enterprises that use XWiki for collaborative documentation or application hosting are at heightened risk. The vulnerability's exploitation does not require user authentication to upload malicious SVGs if upload permissions are not tightly controlled, increasing the attack surface. Additionally, the ability to execute scripts in users' browsers could facilitate targeted phishing or social engineering attacks within organizations. Although no active exploits are known, the medium severity rating reflects the realistic potential for impactful client-side attacks if the vulnerability is left unpatched.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately upgrade XWiki platform installations to version 12.10.6 or later, or to versions 13.3RC1 and above, where the vulnerability is patched. 2) If immediate upgrading is not feasible, configure the platform to disallow SVG file uploads entirely, as SVG files are the vector for this attack. 3) Implement strict access controls on file upload functionality, ensuring only trusted and authenticated users can upload files, and apply content validation to uploaded files to detect and block potentially malicious SVG content. 4) Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and limit the domains from which scripts can be loaded, reducing the impact of any injected scripts. 5) Conduct regular security audits and penetration testing focused on file upload features and web application input sanitization. 6) Educate users about the risks of interacting with unexpected or suspicious files within internal wiki platforms. These steps go beyond generic advice by focusing on configuration hardening, access control, and layered defenses tailored to the nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2021-11-16T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9848c4522896dcbf60f0

Added to database: 5/21/2025, 9:09:28 AM

Last enriched: 6/22/2025, 4:22:21 AM

Last updated: 2/7/2026, 1:53:44 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats