Skip to main content

CVE-2022-36095: CWE-352: Cross-Site Request Forgery (CSRF) in xwiki xwiki-platform

Medium
Published: Thu Sep 08 2022 (09/08/2022, 20:20:13 UTC)
Source: CVE
Vendor/Project: xwiki
Product: xwiki-platform

Description

XWiki Platform is a generic wiki platform. Prior to versions 13.10.5 and 14.3, it is possible to perform a Cross-Site Request Forgery (CSRF) attack for adding or removing tags on XWiki pages. The problem has been patched in XWiki 13.10.5 and 14.3. As a workaround, one may locally modify the `documentTags.vm` template in one's filesystem, to apply the changes exposed there.

AI-Powered Analysis

AILast updated: 06/22/2025, 22:05:54 UTC

Technical Analysis

CVE-2022-36095 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the XWiki Platform, a widely used generic wiki platform for collaborative content management. The vulnerability exists in versions prior to 13.10.5 and between 14.0 and 14.3, where an attacker can exploit insufficient CSRF protections to add or remove tags on XWiki pages without proper authorization. This attack leverages the victim's authenticated session to perform unauthorized state-changing actions on the wiki, specifically modifying page tags, which could be used to manipulate content categorization, influence search results, or disrupt organizational knowledge management. The vulnerability arises due to missing or inadequate anti-CSRF tokens in the request handling of the documentTags.vm template. The issue was patched in versions 13.10.5 and 14.3 by implementing proper CSRF protections. As a temporary workaround, administrators can locally modify the documentTags.vm template to apply the necessary changes to prevent exploitation. There are no known exploits in the wild reported to date, but the vulnerability's presence in widely deployed versions of XWiki means that unpatched systems remain at risk. The attack does not require user interaction beyond the victim visiting a maliciously crafted webpage while authenticated to the vulnerable XWiki instance. The vulnerability impacts the integrity of the wiki content management system by allowing unauthorized modification of page tags, which could indirectly affect confidentiality and availability if used as part of a broader attack chain.

Potential Impact

For European organizations using XWiki Platform, this vulnerability could lead to unauthorized modification of wiki page tags, potentially disrupting internal knowledge bases, documentation, and collaborative workflows. This may result in misinformation, reduced operational efficiency, and compromised data integrity. Organizations relying on XWiki for critical documentation or compliance records could face challenges in maintaining accurate and trustworthy information. While the vulnerability does not directly expose sensitive data or enable remote code execution, attackers could leverage tag manipulation to mislead users or facilitate social engineering attacks. The impact is particularly relevant for sectors with heavy reliance on collaborative documentation such as government agencies, educational institutions, and enterprises in finance and healthcare. Given that XWiki is open-source and widely adopted in Europe, unpatched instances could be targeted by attackers aiming to degrade organizational knowledge management or prepare for more complex attacks. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as automated scanning tools could identify vulnerable instances. The vulnerability's exploitation requires the victim to be authenticated, limiting the attack surface to internal or trusted users, but phishing or social engineering could increase risk.

Mitigation Recommendations

1. Immediate upgrade of XWiki Platform to versions 13.10.5 or 14.3 or later to apply official patches addressing the CSRF vulnerability. 2. If upgrading is not immediately feasible, implement the recommended local modification of the documentTags.vm template to add CSRF token validation as a temporary workaround. 3. Review and enforce strict session management policies, including short session timeouts and re-authentication for sensitive actions, to reduce the window of opportunity for CSRF attacks. 4. Implement Content Security Policy (CSP) headers and SameSite cookie attributes to mitigate CSRF risks by restricting cross-origin requests and cookie transmission. 5. Conduct internal audits of XWiki usage to identify and monitor privileged users and ensure they are trained to recognize phishing attempts that could lead to CSRF exploitation. 6. Monitor web server logs and application logs for unusual tag modification activities or anomalous requests that could indicate attempted exploitation. 7. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns targeting the documentTags.vm endpoint. 8. Regularly update and patch all components of the XWiki environment and maintain an inventory of deployed versions to ensure timely vulnerability management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3df3

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/22/2025, 10:05:54 PM

Last updated: 7/29/2025, 9:22:13 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats