CVE-2022-23621: CWE-862: Missing Authorization in xwiki xwiki-platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString as `$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")`. This issue has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1. Users are advised to update. The only workaround is to limit SCRIPT right.
AI Analysis
Technical Summary
CVE-2022-23621 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability exists in certain versions of XWiki Platform prior to the patched releases 12.10.9, 13.4.3, and 13.7-rc-1. Specifically, any user with the SCRIPT right can exploit this flaw to read arbitrary files located within the XWiki WAR archive, including sensitive configuration files such as xwiki.cfg and xwiki.properties. This is achieved by invoking the method XWiki#invokeServletAndReturnAsString with a path to the target file, for example, $xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg"). The root cause is the lack of proper authorization checks when accessing these internal files, allowing users with SCRIPT privileges to bypass intended access controls. The vulnerability does not require elevated privileges beyond SCRIPT rights, nor does it require additional user interaction beyond executing the script. Although no known exploits have been reported in the wild, the exposure of configuration files can lead to significant information disclosure, potentially revealing database credentials, internal URLs, or other sensitive operational parameters. The issue has been addressed by the vendor through patches in the specified versions, and the only interim mitigation is to restrict SCRIPT rights to trusted users only.
Potential Impact
For European organizations using affected versions of XWiki Platform, this vulnerability poses a medium-level risk primarily due to unauthorized disclosure of sensitive configuration files. Exposure of these files can compromise confidentiality by revealing credentials, internal service endpoints, or security settings, which could facilitate further attacks such as privilege escalation, lateral movement, or data exfiltration. Integrity and availability impacts are less direct but could follow if attackers leverage disclosed information to deploy secondary attacks. Organizations in sectors with stringent data protection requirements (e.g., finance, healthcare, government) could face compliance risks if sensitive data is leaked. Since the vulnerability requires SCRIPT rights, the impact depends on how broadly these rights are assigned within an organization. Misconfigured or overly permissive access controls could increase risk. The absence of known exploits suggests limited active targeting, but the ease of exploitation and potential impact warrant prompt remediation. European organizations relying on XWiki for internal documentation, collaboration, or application platforms should prioritize patching to prevent unauthorized access to critical configuration data.
Mitigation Recommendations
1. Immediate patching: Upgrade XWiki Platform installations to versions 12.10.9, 13.4.3, or 13.7-rc-1 or later where the vulnerability is fixed. 2. Restrict SCRIPT rights: Audit current user permissions and limit SCRIPT rights strictly to trusted administrators or service accounts. Avoid granting SCRIPT rights to general users or untrusted parties. 3. Monitor usage: Implement logging and monitoring of SCRIPT executions to detect unusual or unauthorized attempts to invoke internal servlets or access sensitive files. 4. Configuration review: Review and harden configuration files to minimize sensitive information exposure, such as using environment variables or external secrets management where possible. 5. Network segmentation: Isolate XWiki instances within secure network zones to reduce exposure to unauthorized users. 6. Incident response readiness: Prepare to investigate and respond to any suspicious activity related to XWiki, including potential data access or exfiltration attempts. 7. User training: Educate administrators and users with SCRIPT rights about the risks and proper usage to prevent accidental misuse.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2022-23621: CWE-862: Missing Authorization in xwiki xwiki-platform
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString as `$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")`. This issue has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1. Users are advised to update. The only workaround is to limit SCRIPT right.
AI-Powered Analysis
Technical Analysis
CVE-2022-23621 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability exists in certain versions of XWiki Platform prior to the patched releases 12.10.9, 13.4.3, and 13.7-rc-1. Specifically, any user with the SCRIPT right can exploit this flaw to read arbitrary files located within the XWiki WAR archive, including sensitive configuration files such as xwiki.cfg and xwiki.properties. This is achieved by invoking the method XWiki#invokeServletAndReturnAsString with a path to the target file, for example, $xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg"). The root cause is the lack of proper authorization checks when accessing these internal files, allowing users with SCRIPT privileges to bypass intended access controls. The vulnerability does not require elevated privileges beyond SCRIPT rights, nor does it require additional user interaction beyond executing the script. Although no known exploits have been reported in the wild, the exposure of configuration files can lead to significant information disclosure, potentially revealing database credentials, internal URLs, or other sensitive operational parameters. The issue has been addressed by the vendor through patches in the specified versions, and the only interim mitigation is to restrict SCRIPT rights to trusted users only.
Potential Impact
For European organizations using affected versions of XWiki Platform, this vulnerability poses a medium-level risk primarily due to unauthorized disclosure of sensitive configuration files. Exposure of these files can compromise confidentiality by revealing credentials, internal service endpoints, or security settings, which could facilitate further attacks such as privilege escalation, lateral movement, or data exfiltration. Integrity and availability impacts are less direct but could follow if attackers leverage disclosed information to deploy secondary attacks. Organizations in sectors with stringent data protection requirements (e.g., finance, healthcare, government) could face compliance risks if sensitive data is leaked. Since the vulnerability requires SCRIPT rights, the impact depends on how broadly these rights are assigned within an organization. Misconfigured or overly permissive access controls could increase risk. The absence of known exploits suggests limited active targeting, but the ease of exploitation and potential impact warrant prompt remediation. European organizations relying on XWiki for internal documentation, collaboration, or application platforms should prioritize patching to prevent unauthorized access to critical configuration data.
Mitigation Recommendations
1. Immediate patching: Upgrade XWiki Platform installations to versions 12.10.9, 13.4.3, or 13.7-rc-1 or later where the vulnerability is fixed. 2. Restrict SCRIPT rights: Audit current user permissions and limit SCRIPT rights strictly to trusted administrators or service accounts. Avoid granting SCRIPT rights to general users or untrusted parties. 3. Monitor usage: Implement logging and monitoring of SCRIPT executions to detect unusual or unauthorized attempts to invoke internal servlets or access sensitive files. 4. Configuration review: Review and harden configuration files to minimize sensitive information exposure, such as using environment variables or external secrets management where possible. 5. Network segmentation: Isolate XWiki instances within secure network zones to reduce exposure to unauthorized users. 6. Incident response readiness: Prepare to investigate and respond to any suspicious activity related to XWiki, including potential data access or exfiltration attempts. 7. User training: Educate administrators and users with SCRIPT rights about the risks and proper usage to prevent accidental misuse.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9842c4522896dcbf2586
Added to database: 5/21/2025, 9:09:22 AM
Last enriched: 6/23/2025, 4:32:16 PM
Last updated: 8/15/2025, 12:48:22 AM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.