Skip to main content

CVE-2022-23617: CWE-862: Missing Authorization in xwiki xwiki-platform

Medium
Published: Wed Feb 09 2022 (02/09/2022, 21:00:14 UTC)
Source: CVE
Vendor/Project: xwiki
Product: xwiki-platform

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit right can copy the content of a page it does not have access to by using it as template of a new page. This issue has been patched in XWiki 13.2CR1 and 12.10.6. Users are advised to update. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/23/2025, 16:33:16 UTC

Technical Analysis

CVE-2022-23617 is a security vulnerability identified in the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability is classified under CWE-862, which pertains to missing authorization controls. Specifically, in affected versions of XWiki Platform (versions >= 13.0.0 and < 13.2-rc-1, and versions below 12.10.6), any user who has edit rights on the platform can exploit this flaw to copy the content of a page they do not have access to by using that page as a template for creating a new page. This means that although the user lacks direct read or view permissions for certain pages, they can indirectly access the content by duplicating it, thereby bypassing intended access control restrictions. The issue arises because the platform does not properly enforce authorization checks when a page is used as a template during page creation. This vulnerability compromises the confidentiality of restricted content within the wiki. The vendor has addressed this issue in versions 13.2CR1 and 12.10.6, and users are strongly advised to update to these or later versions. There are no known workarounds available, which means that until patched, affected installations remain vulnerable. No known exploits have been reported in the wild, but the vulnerability is straightforward to exploit for users with edit permissions, making it a significant risk in environments where edit rights are broadly assigned or insufficiently controlled.

Potential Impact

For European organizations, the impact of CVE-2022-23617 can be significant, especially for those relying on XWiki Platform for internal documentation, knowledge management, or collaborative applications that handle sensitive or proprietary information. The vulnerability allows unauthorized disclosure of confidential information by bypassing access controls, potentially exposing intellectual property, internal communications, or regulated data. This could lead to compliance violations under regulations such as GDPR if personal or sensitive data is exposed. Additionally, the breach of confidentiality can undermine trust within organizations and with partners or customers. Since the exploit requires only edit rights, organizations with lax role management or broad edit permissions are at higher risk. The vulnerability does not directly affect system integrity or availability but compromises confidentiality, which can have downstream operational and reputational consequences. Given that XWiki is used across various sectors including government, education, and enterprises in Europe, the risk is non-trivial. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk, especially from insider threats or opportunistic attackers.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading all affected XWiki Platform instances to version 13.2CR1, 12.10.6, or later, where the authorization checks have been properly enforced. Since no workarounds exist, patching is the primary defense. Additionally, organizations should audit and tighten user permissions, ensuring that edit rights are granted only to trusted users who require them for their roles. Implementing strict role-based access control (RBAC) policies can reduce the attack surface. Monitoring and logging user activities related to page creation and template usage can help detect suspicious behavior indicative of exploitation attempts. Organizations should also review their internal wiki content classification and restrict sensitive content to pages with the most stringent access controls. Regular security assessments and penetration testing focused on access control mechanisms in XWiki deployments can help identify residual risks. Finally, educating users about the sensitivity of edit rights and the potential for misuse can enhance internal security posture.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-01-19T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf254f

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 4:33:16 PM

Last updated: 8/13/2025, 2:33:03 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats