Skip to main content

CVE-2022-23618: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in xwiki xwiki-platform

Medium
Published: Wed Feb 09 2022 (02/09/2022, 21:05:11 UTC)
Source: CVE
Vendor/Project: xwiki
Product: xwiki-platform

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions there is no protection against URL redirection to untrusted sites, in particular some well known parameters (xredirect) can be used to perform url redirections. This problem has been patched in XWiki 12.10.7 and XWiki 13.3RC1. Users are advised to update. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/23/2025, 16:33:02 UTC

Technical Analysis

CVE-2022-23618 is a medium-severity vulnerability classified under CWE-601, known as an 'Open Redirect' issue, affecting the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability exists in certain versions of the XWiki Platform (versions >= 13.0.0 and < 13.3RC1, and all versions below 12.10.7) where there is insufficient validation or protection against URL redirection to untrusted sites. Specifically, the vulnerability arises from the misuse of parameters such as 'xredirect', which can be manipulated by an attacker to redirect users to malicious external URLs without proper validation. This flaw can be exploited by crafting malicious links that appear to originate from a trusted XWiki domain but redirect victims to phishing sites, malware distribution points, or other harmful destinations. The vulnerability does not require authentication or user interaction beyond clicking a crafted link, making it relatively easy to exploit in phishing or social engineering campaigns. The issue has been addressed in patched versions 12.10.7 and 13.3RC1 of the XWiki Platform. No known workarounds exist, so updating to these or later versions is the primary remediation. There are no known exploits in the wild reported to date, but the nature of open redirects makes this a persistent risk for user trust and potential downstream attacks.

Potential Impact

For European organizations using vulnerable versions of the XWiki Platform, this open redirect vulnerability poses a risk primarily to the confidentiality and integrity of user interactions. Attackers can leverage the vulnerability to conduct phishing attacks by redirecting users to malicious sites that harvest credentials or distribute malware. This can lead to credential compromise, unauthorized access, and potential lateral movement within networks if attackers gain initial footholds. The vulnerability can also damage organizational reputation and user trust, especially in sectors where secure collaboration and information sharing are critical, such as government, finance, healthcare, and education. While the vulnerability does not directly compromise the availability or integrity of the XWiki Platform itself, the indirect consequences of successful phishing or malware campaigns can be severe. Given the ease of exploitation without authentication and the widespread use of XWiki in European enterprises and public sector entities, the impact can be significant if not mitigated promptly.

Mitigation Recommendations

1. Immediate upgrade: Organizations should prioritize upgrading all instances of XWiki Platform to versions 12.10.7, 13.3RC1, or later, where the vulnerability has been patched. 2. URL filtering and validation: Implement strict URL filtering and validation on web gateways and proxies to detect and block suspicious redirection attempts originating from XWiki URLs. 3. User awareness training: Educate users about the risks of clicking on unexpected or suspicious links, especially those appearing to originate from internal wiki platforms. 4. Monitoring and logging: Enable detailed logging of URL redirection events within XWiki and monitor for unusual redirect patterns or spikes in redirect-related errors. 5. Web application firewall (WAF): Deploy or update WAF rules to detect and block exploitation attempts targeting the 'xredirect' parameter or similar redirect mechanisms in XWiki. 6. Incident response readiness: Prepare incident response procedures to quickly address phishing or malware incidents potentially linked to this vulnerability. 7. Network segmentation: Limit the exposure of XWiki instances to only necessary user groups and networks to reduce the attack surface. These measures, combined with patching, will reduce the risk of exploitation and downstream impacts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-01-19T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf2553

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 4:33:02 PM

Last updated: 8/5/2025, 9:10:51 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats