Skip to main content

CVE-2022-24821: CWE-648: Incorrect Use of Privileged APIs in xwiki xwiki-platform

Medium
Published: Fri Apr 08 2022 (04/08/2022, 18:55:10 UTC)
Source: CVE
Vendor/Project: xwiki
Product: xwiki-platform

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Simple users can create global SSX/JSX without specific rights: in theory only users with Programming Rights should be allowed to create SSX or JSX that are executed everywhere on a wiki. But a bug allow anyone with edit rights to actually create those. This issue has been patched in XWiki 13.10-rc-1, 12.10.11 and 13.4.6. There's no easy workaround for this issue, administrators should upgrade their wiki.

AI-Powered Analysis

AILast updated: 06/22/2025, 02:34:47 UTC

Technical Analysis

CVE-2022-24821 is a vulnerability in the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability stems from an incorrect use of privileged APIs (CWE-648), specifically related to the creation of server-side scripts (SSX) and JavaScript extensions (JSX). Normally, only users with Programming Rights should be able to create SSX or JSX scripts because these scripts execute globally across the wiki and can affect all users and content. However, due to a bug in affected versions of XWiki Platform (versions greater than 3.1M1 and prior to patched releases 13.10-rc-1, 12.10.11, and 13.4.6), any user with mere edit rights can create these scripts. This effectively escalates privileges for users who should not have programming capabilities, allowing them to execute arbitrary code within the wiki environment. The vulnerability does not require any special authentication beyond edit rights, and no user interaction beyond normal editing is needed. Exploitation could lead to unauthorized code execution, potentially compromising the confidentiality, integrity, and availability of the wiki content and underlying systems. The issue has been patched in recent versions, and no known exploits have been reported in the wild. There is no easy workaround, so upgrading to a patched version is the recommended remediation.

Potential Impact

For European organizations using XWiki Platform, this vulnerability poses a significant risk. Since the flaw allows users with edit rights to execute arbitrary code globally, it can lead to unauthorized data access, data manipulation, or disruption of wiki services. This could compromise sensitive organizational knowledge bases, internal documentation, or collaborative projects hosted on XWiki. The impact is particularly critical for organizations relying heavily on XWiki for knowledge management, such as government agencies, research institutions, and large enterprises. Unauthorized script execution could also serve as a foothold for further lateral movement within the network, potentially leading to broader compromise. Given that many European organizations use open-source platforms like XWiki, and considering the platform's popularity in sectors such as education, public administration, and software development, the vulnerability could have widespread implications if left unpatched.

Mitigation Recommendations

The primary and most effective mitigation is to upgrade affected XWiki Platform installations to the patched versions 13.10-rc-1, 12.10.11, or 13.4.6 as soon as possible. Administrators should audit user permissions to ensure that only trusted users have edit rights, minimizing the risk window before patching. Implementing strict access controls and monitoring for unusual script creation or modification activities within the wiki can help detect exploitation attempts. Additionally, organizations should consider isolating the XWiki environment using network segmentation and applying application-level firewalls or runtime application self-protection (RASP) solutions to detect and block unauthorized script execution. Regular backups of wiki content and configurations should be maintained to enable recovery in case of compromise. Since no easy workaround exists, reliance on patching and proactive monitoring is critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-02-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9848c4522896dcbf6396

Added to database: 5/21/2025, 9:09:28 AM

Last enriched: 6/22/2025, 2:34:47 AM

Last updated: 7/25/2025, 11:46:29 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats