Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-23617: CWE-862: Missing Authorization in xwiki xwiki-platform

0
Medium
Published: Wed Feb 09 2022 (02/09/2022, 21:00:14 UTC)
Source: CVE
Vendor/Project: xwiki
Product: xwiki-platform

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit right can copy the content of a page it does not have access to by using it as template of a new page. This issue has been patched in XWiki 13.2CR1 and 12.10.6. Users are advised to update. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/23/2025, 16:33:16 UTC

Technical Analysis

CVE-2022-23617 is a security vulnerability identified in the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability is classified under CWE-862, which pertains to missing authorization controls. Specifically, in affected versions of XWiki Platform (versions >= 13.0.0 and < 13.2-rc-1, and versions below 12.10.6), any user who has edit rights on the platform can exploit this flaw to copy the content of a page they do not have access to by using that page as a template for creating a new page. This means that although the user lacks direct read or view permissions for certain pages, they can indirectly access the content by duplicating it, thereby bypassing intended access control restrictions. The issue arises because the platform does not properly enforce authorization checks when a page is used as a template during page creation. This vulnerability compromises the confidentiality of restricted content within the wiki. The vendor has addressed this issue in versions 13.2CR1 and 12.10.6, and users are strongly advised to update to these or later versions. There are no known workarounds available, which means that until patched, affected installations remain vulnerable. No known exploits have been reported in the wild, but the vulnerability is straightforward to exploit for users with edit permissions, making it a significant risk in environments where edit rights are broadly assigned or insufficiently controlled.

Potential Impact

For European organizations, the impact of CVE-2022-23617 can be significant, especially for those relying on XWiki Platform for internal documentation, knowledge management, or collaborative applications that handle sensitive or proprietary information. The vulnerability allows unauthorized disclosure of confidential information by bypassing access controls, potentially exposing intellectual property, internal communications, or regulated data. This could lead to compliance violations under regulations such as GDPR if personal or sensitive data is exposed. Additionally, the breach of confidentiality can undermine trust within organizations and with partners or customers. Since the exploit requires only edit rights, organizations with lax role management or broad edit permissions are at higher risk. The vulnerability does not directly affect system integrity or availability but compromises confidentiality, which can have downstream operational and reputational consequences. Given that XWiki is used across various sectors including government, education, and enterprises in Europe, the risk is non-trivial. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk, especially from insider threats or opportunistic attackers.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading all affected XWiki Platform instances to version 13.2CR1, 12.10.6, or later, where the authorization checks have been properly enforced. Since no workarounds exist, patching is the primary defense. Additionally, organizations should audit and tighten user permissions, ensuring that edit rights are granted only to trusted users who require them for their roles. Implementing strict role-based access control (RBAC) policies can reduce the attack surface. Monitoring and logging user activities related to page creation and template usage can help detect suspicious behavior indicative of exploitation attempts. Organizations should also review their internal wiki content classification and restrict sensitive content to pages with the most stringent access controls. Regular security assessments and penetration testing focused on access control mechanisms in XWiki deployments can help identify residual risks. Finally, educating users about the sensitivity of edit rights and the potential for misuse can enhance internal security posture.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-01-19T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf254f

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 4:33:16 PM

Last updated: 2/7/2026, 11:21:04 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats