CVE-2022-23615: CWE-863: Incorrect Authorization in xwiki xwiki-platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. This has been patched in XWiki 13.0. Users are advised to update to resolve this issue. The only known workaround is to limit SCRIPT access.
AI Analysis
Technical Summary
CVE-2022-23615 is a medium-severity vulnerability classified under CWE-863 (Incorrect Authorization) affecting the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability exists in versions from 1.0 up to, but not including, 13.0. The core issue arises from improper authorization checks related to the SCRIPT right. Specifically, any user possessing the SCRIPT right can save a document with the rights of the current user. This behavior allows the user to escalate privileges indirectly by accessing APIs that require the programming right if the current user has it. Essentially, a user with SCRIPT rights can leverage the rights of another user who has programming rights, thereby bypassing intended access controls. This flaw could enable unauthorized users to perform actions that should be restricted to users with higher privileges, such as executing scripts or modifying system configurations. The vulnerability has been addressed and patched in XWiki version 13.0. Until systems are updated, the only known workaround is to restrict SCRIPT access strictly, limiting it to trusted users only. There are no known exploits in the wild at the time of reporting, but the vulnerability's nature makes it a potential target for privilege escalation attacks within organizations using vulnerable versions of XWiki Platform.
Potential Impact
For European organizations, the impact of CVE-2022-23615 can be significant, especially for those relying on XWiki Platform for internal documentation, collaboration, or as a foundation for custom applications. Unauthorized privilege escalation could lead to unauthorized code execution, data modification, or exposure of sensitive information stored within the wiki environment. This can compromise the confidentiality, integrity, and availability of organizational knowledge bases and potentially other integrated systems. Given that XWiki is often used in enterprise and government environments, exploitation could disrupt business operations, leak intellectual property, or facilitate further lateral movement within networks. The impact is heightened in sectors with stringent data protection requirements such as finance, healthcare, and public administration, common in Europe. Additionally, the ability to execute scripts or access programming APIs without proper authorization could allow attackers to implant persistent backdoors or manipulate workflows, increasing the risk of long-term compromise.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately upgrade all XWiki Platform instances to version 13.0 or later, where the vulnerability is patched. 2) Until upgrades are completed, restrict SCRIPT rights to the minimum number of trusted users, ideally only administrators or highly trusted personnel, to reduce the attack surface. 3) Conduct an audit of current user permissions to identify and remove unnecessary SCRIPT rights. 4) Implement monitoring and alerting for unusual activities related to document saving or API access that could indicate exploitation attempts. 5) Review and harden access control policies within XWiki to ensure strict separation of duties between users with SCRIPT and programming rights. 6) Consider network segmentation and application-layer firewalls to limit access to XWiki instances from untrusted networks. 7) Educate users about the risks associated with privilege escalation and encourage reporting of suspicious behavior. These steps go beyond generic advice by focusing on permission audits, monitoring, and operational controls tailored to the specific nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Austria
CVE-2022-23615: CWE-863: Incorrect Authorization in xwiki xwiki-platform
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. This has been patched in XWiki 13.0. Users are advised to update to resolve this issue. The only known workaround is to limit SCRIPT access.
AI-Powered Analysis
Technical Analysis
CVE-2022-23615 is a medium-severity vulnerability classified under CWE-863 (Incorrect Authorization) affecting the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability exists in versions from 1.0 up to, but not including, 13.0. The core issue arises from improper authorization checks related to the SCRIPT right. Specifically, any user possessing the SCRIPT right can save a document with the rights of the current user. This behavior allows the user to escalate privileges indirectly by accessing APIs that require the programming right if the current user has it. Essentially, a user with SCRIPT rights can leverage the rights of another user who has programming rights, thereby bypassing intended access controls. This flaw could enable unauthorized users to perform actions that should be restricted to users with higher privileges, such as executing scripts or modifying system configurations. The vulnerability has been addressed and patched in XWiki version 13.0. Until systems are updated, the only known workaround is to restrict SCRIPT access strictly, limiting it to trusted users only. There are no known exploits in the wild at the time of reporting, but the vulnerability's nature makes it a potential target for privilege escalation attacks within organizations using vulnerable versions of XWiki Platform.
Potential Impact
For European organizations, the impact of CVE-2022-23615 can be significant, especially for those relying on XWiki Platform for internal documentation, collaboration, or as a foundation for custom applications. Unauthorized privilege escalation could lead to unauthorized code execution, data modification, or exposure of sensitive information stored within the wiki environment. This can compromise the confidentiality, integrity, and availability of organizational knowledge bases and potentially other integrated systems. Given that XWiki is often used in enterprise and government environments, exploitation could disrupt business operations, leak intellectual property, or facilitate further lateral movement within networks. The impact is heightened in sectors with stringent data protection requirements such as finance, healthcare, and public administration, common in Europe. Additionally, the ability to execute scripts or access programming APIs without proper authorization could allow attackers to implant persistent backdoors or manipulate workflows, increasing the risk of long-term compromise.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately upgrade all XWiki Platform instances to version 13.0 or later, where the vulnerability is patched. 2) Until upgrades are completed, restrict SCRIPT rights to the minimum number of trusted users, ideally only administrators or highly trusted personnel, to reduce the attack surface. 3) Conduct an audit of current user permissions to identify and remove unnecessary SCRIPT rights. 4) Implement monitoring and alerting for unusual activities related to document saving or API access that could indicate exploitation attempts. 5) Review and harden access control policies within XWiki to ensure strict separation of duties between users with SCRIPT and programming rights. 6) Consider network segmentation and application-layer firewalls to limit access to XWiki instances from untrusted networks. 7) Educate users about the risks associated with privilege escalation and encourage reporting of suspicious behavior. These steps go beyond generic advice by focusing on permission audits, monitoring, and operational controls tailored to the specific nature of this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9842c4522896dcbf2547
Added to database: 5/21/2025, 9:09:22 AM
Last enriched: 6/23/2025, 4:33:46 PM
Last updated: 2/7/2026, 11:21:43 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.