CVE-2022-23618: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in xwiki xwiki-platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions there is no protection against URL redirection to untrusted sites, in particular some well known parameters (xredirect) can be used to perform url redirections. This problem has been patched in XWiki 12.10.7 and XWiki 13.3RC1. Users are advised to update. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-23618 is a medium-severity vulnerability classified under CWE-601, known as an 'Open Redirect' issue, affecting the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability exists in certain versions of the XWiki Platform (versions >= 13.0.0 and < 13.3RC1, and all versions below 12.10.7) where there is insufficient validation or protection against URL redirection to untrusted sites. Specifically, the vulnerability arises from the misuse of parameters such as 'xredirect', which can be manipulated by an attacker to redirect users to malicious external URLs without proper validation. This flaw can be exploited by crafting malicious links that appear to originate from a trusted XWiki domain but redirect victims to phishing sites, malware distribution points, or other harmful destinations. The vulnerability does not require authentication or user interaction beyond clicking a crafted link, making it relatively easy to exploit in phishing or social engineering campaigns. The issue has been addressed in patched versions 12.10.7 and 13.3RC1 of the XWiki Platform. No known workarounds exist, so updating to these or later versions is the primary remediation. There are no known exploits in the wild reported to date, but the nature of open redirects makes this a persistent risk for user trust and potential downstream attacks.
Potential Impact
For European organizations using vulnerable versions of the XWiki Platform, this open redirect vulnerability poses a risk primarily to the confidentiality and integrity of user interactions. Attackers can leverage the vulnerability to conduct phishing attacks by redirecting users to malicious sites that harvest credentials or distribute malware. This can lead to credential compromise, unauthorized access, and potential lateral movement within networks if attackers gain initial footholds. The vulnerability can also damage organizational reputation and user trust, especially in sectors where secure collaboration and information sharing are critical, such as government, finance, healthcare, and education. While the vulnerability does not directly compromise the availability or integrity of the XWiki Platform itself, the indirect consequences of successful phishing or malware campaigns can be severe. Given the ease of exploitation without authentication and the widespread use of XWiki in European enterprises and public sector entities, the impact can be significant if not mitigated promptly.
Mitigation Recommendations
1. Immediate upgrade: Organizations should prioritize upgrading all instances of XWiki Platform to versions 12.10.7, 13.3RC1, or later, where the vulnerability has been patched. 2. URL filtering and validation: Implement strict URL filtering and validation on web gateways and proxies to detect and block suspicious redirection attempts originating from XWiki URLs. 3. User awareness training: Educate users about the risks of clicking on unexpected or suspicious links, especially those appearing to originate from internal wiki platforms. 4. Monitoring and logging: Enable detailed logging of URL redirection events within XWiki and monitor for unusual redirect patterns or spikes in redirect-related errors. 5. Web application firewall (WAF): Deploy or update WAF rules to detect and block exploitation attempts targeting the 'xredirect' parameter or similar redirect mechanisms in XWiki. 6. Incident response readiness: Prepare incident response procedures to quickly address phishing or malware incidents potentially linked to this vulnerability. 7. Network segmentation: Limit the exposure of XWiki instances to only necessary user groups and networks to reduce the attack surface. These measures, combined with patching, will reduce the risk of exploitation and downstream impacts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Austria
CVE-2022-23618: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in xwiki xwiki-platform
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions there is no protection against URL redirection to untrusted sites, in particular some well known parameters (xredirect) can be used to perform url redirections. This problem has been patched in XWiki 12.10.7 and XWiki 13.3RC1. Users are advised to update. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-23618 is a medium-severity vulnerability classified under CWE-601, known as an 'Open Redirect' issue, affecting the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability exists in certain versions of the XWiki Platform (versions >= 13.0.0 and < 13.3RC1, and all versions below 12.10.7) where there is insufficient validation or protection against URL redirection to untrusted sites. Specifically, the vulnerability arises from the misuse of parameters such as 'xredirect', which can be manipulated by an attacker to redirect users to malicious external URLs without proper validation. This flaw can be exploited by crafting malicious links that appear to originate from a trusted XWiki domain but redirect victims to phishing sites, malware distribution points, or other harmful destinations. The vulnerability does not require authentication or user interaction beyond clicking a crafted link, making it relatively easy to exploit in phishing or social engineering campaigns. The issue has been addressed in patched versions 12.10.7 and 13.3RC1 of the XWiki Platform. No known workarounds exist, so updating to these or later versions is the primary remediation. There are no known exploits in the wild reported to date, but the nature of open redirects makes this a persistent risk for user trust and potential downstream attacks.
Potential Impact
For European organizations using vulnerable versions of the XWiki Platform, this open redirect vulnerability poses a risk primarily to the confidentiality and integrity of user interactions. Attackers can leverage the vulnerability to conduct phishing attacks by redirecting users to malicious sites that harvest credentials or distribute malware. This can lead to credential compromise, unauthorized access, and potential lateral movement within networks if attackers gain initial footholds. The vulnerability can also damage organizational reputation and user trust, especially in sectors where secure collaboration and information sharing are critical, such as government, finance, healthcare, and education. While the vulnerability does not directly compromise the availability or integrity of the XWiki Platform itself, the indirect consequences of successful phishing or malware campaigns can be severe. Given the ease of exploitation without authentication and the widespread use of XWiki in European enterprises and public sector entities, the impact can be significant if not mitigated promptly.
Mitigation Recommendations
1. Immediate upgrade: Organizations should prioritize upgrading all instances of XWiki Platform to versions 12.10.7, 13.3RC1, or later, where the vulnerability has been patched. 2. URL filtering and validation: Implement strict URL filtering and validation on web gateways and proxies to detect and block suspicious redirection attempts originating from XWiki URLs. 3. User awareness training: Educate users about the risks of clicking on unexpected or suspicious links, especially those appearing to originate from internal wiki platforms. 4. Monitoring and logging: Enable detailed logging of URL redirection events within XWiki and monitor for unusual redirect patterns or spikes in redirect-related errors. 5. Web application firewall (WAF): Deploy or update WAF rules to detect and block exploitation attempts targeting the 'xredirect' parameter or similar redirect mechanisms in XWiki. 6. Incident response readiness: Prepare incident response procedures to quickly address phishing or malware incidents potentially linked to this vulnerability. 7. Network segmentation: Limit the exposure of XWiki instances to only necessary user groups and networks to reduce the attack surface. These measures, combined with patching, will reduce the risk of exploitation and downstream impacts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9842c4522896dcbf2553
Added to database: 5/21/2025, 9:09:22 AM
Last enriched: 6/23/2025, 4:33:02 PM
Last updated: 2/7/2026, 11:52:27 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.