CVE-2022-36100: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform
XWiki Platform Applications Tag and XWiki Platform Tag UI are tag applications for XWiki, a generic wiki platform. Starting with version 1.7 in XWiki Platform Applications Tag and prior to 13.10.6 and 14.4 in XWiki Platform Tag UI, the tags document `Main.Tags` in XWiki didn't sanitize user inputs properly. This allowed users with view rights on the document (default in a public wiki or for authenticated users on private wikis) to execute arbitrary Groovy, Python and Velocity code with programming rights. This also allowed bypassing all rights checks and thus both modification and disclosure of all content stored in the XWiki installation. The vulnerability could be used to impact the availability of the wiki. On XWiki versions before 13.10.4 and 14.2, this can be combined with CVE-2022-36092, meaning that no rights are required to perform the attack. The vulnerability has been patched in versions 13.10.6 and 14.4. As a workaround, the patch that fixes the issue can be manually applied to the document `Main.Tags` or the updated version of that document can be imported from version 14.4 of xwiki-platform-tag-ui using the import feature in the administration UI on XWiki 10.9 and later.
AI Analysis
Technical Summary
CVE-2022-36100 is a code injection vulnerability affecting the XWiki Platform, specifically in the Applications Tag and Tag UI components. These components manage tags within the XWiki platform, a widely used generic wiki system. The vulnerability arises from improper sanitization of user inputs in the tags document `Main.Tags`. This flaw allows users with view rights—which are often granted by default in public wikis or to authenticated users in private wikis—to inject and execute arbitrary code in Groovy, Python, and Velocity scripting languages. The execution occurs with programming rights, which are highly privileged, enabling attackers to bypass all access controls. Consequently, an attacker can modify or disclose any content stored within the XWiki installation, severely compromising confidentiality and integrity. Additionally, the vulnerability can be leveraged to disrupt the availability of the wiki service. On versions prior to 13.10.4 and 14.2, this vulnerability can be combined with CVE-2022-36092 to allow exploitation without any rights, further increasing risk. The issue affects XWiki versions from 1.7 up to but not including 13.10.6, and versions 14.0 up to but not including 14.4. The vulnerability has been patched in versions 13.10.6 and 14.4. Workarounds include manually applying the patch to the `Main.Tags` document or importing the updated document from version 14.4 using the administration UI on XWiki 10.9 and later. There are no known exploits in the wild at this time. The vulnerability is classified under CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code) and CWE-94 (Improper Control of Generation of Code), indicating a critical failure in input validation and code execution control mechanisms.
Potential Impact
For European organizations using XWiki as a collaboration or knowledge management platform, this vulnerability poses significant risks. The ability for users with minimal permissions to execute arbitrary code with elevated privileges can lead to full compromise of the wiki environment. This includes unauthorized disclosure of sensitive corporate or personal data, unauthorized modification or deletion of critical documentation, and potential disruption of business operations relying on the wiki. Since XWiki is often used in public and private enterprise environments, the impact extends to intellectual property theft, regulatory compliance violations (e.g., GDPR), and reputational damage. The possibility of combining this vulnerability with another (CVE-2022-36092) to achieve exploitation without any authentication further exacerbates the threat, especially for publicly accessible wikis. The availability impact could disrupt internal communications and knowledge sharing, affecting productivity and incident response capabilities. Given the nature of the vulnerability, attackers could also use the compromised wiki as a pivot point to launch further attacks within the network.
Mitigation Recommendations
1. Immediate upgrade to XWiki Platform versions 13.10.6 or 14.4 or later where the vulnerability is patched. 2. If immediate upgrade is not feasible, manually apply the patch to the `Main.Tags` document as provided by the vendor or import the updated document from version 14.4 using the administration UI on versions 10.9 and later. 3. Restrict view rights on the `Main.Tags` document and related tag components to trusted users only, reducing the attack surface. 4. Implement strict network segmentation and access controls to limit exposure of the XWiki platform to untrusted networks and users. 5. Monitor logs for unusual scripting activity or unauthorized access attempts within the wiki environment. 6. Conduct a thorough audit of user permissions to ensure the principle of least privilege is enforced, especially regarding programming rights. 7. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious code injection attempts targeting the wiki. 8. Educate administrators and users about the risks of code injection vulnerabilities and the importance of promptly applying security updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2022-36100: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform
Description
XWiki Platform Applications Tag and XWiki Platform Tag UI are tag applications for XWiki, a generic wiki platform. Starting with version 1.7 in XWiki Platform Applications Tag and prior to 13.10.6 and 14.4 in XWiki Platform Tag UI, the tags document `Main.Tags` in XWiki didn't sanitize user inputs properly. This allowed users with view rights on the document (default in a public wiki or for authenticated users on private wikis) to execute arbitrary Groovy, Python and Velocity code with programming rights. This also allowed bypassing all rights checks and thus both modification and disclosure of all content stored in the XWiki installation. The vulnerability could be used to impact the availability of the wiki. On XWiki versions before 13.10.4 and 14.2, this can be combined with CVE-2022-36092, meaning that no rights are required to perform the attack. The vulnerability has been patched in versions 13.10.6 and 14.4. As a workaround, the patch that fixes the issue can be manually applied to the document `Main.Tags` or the updated version of that document can be imported from version 14.4 of xwiki-platform-tag-ui using the import feature in the administration UI on XWiki 10.9 and later.
AI-Powered Analysis
Technical Analysis
CVE-2022-36100 is a code injection vulnerability affecting the XWiki Platform, specifically in the Applications Tag and Tag UI components. These components manage tags within the XWiki platform, a widely used generic wiki system. The vulnerability arises from improper sanitization of user inputs in the tags document `Main.Tags`. This flaw allows users with view rights—which are often granted by default in public wikis or to authenticated users in private wikis—to inject and execute arbitrary code in Groovy, Python, and Velocity scripting languages. The execution occurs with programming rights, which are highly privileged, enabling attackers to bypass all access controls. Consequently, an attacker can modify or disclose any content stored within the XWiki installation, severely compromising confidentiality and integrity. Additionally, the vulnerability can be leveraged to disrupt the availability of the wiki service. On versions prior to 13.10.4 and 14.2, this vulnerability can be combined with CVE-2022-36092 to allow exploitation without any rights, further increasing risk. The issue affects XWiki versions from 1.7 up to but not including 13.10.6, and versions 14.0 up to but not including 14.4. The vulnerability has been patched in versions 13.10.6 and 14.4. Workarounds include manually applying the patch to the `Main.Tags` document or importing the updated document from version 14.4 using the administration UI on XWiki 10.9 and later. There are no known exploits in the wild at this time. The vulnerability is classified under CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code) and CWE-94 (Improper Control of Generation of Code), indicating a critical failure in input validation and code execution control mechanisms.
Potential Impact
For European organizations using XWiki as a collaboration or knowledge management platform, this vulnerability poses significant risks. The ability for users with minimal permissions to execute arbitrary code with elevated privileges can lead to full compromise of the wiki environment. This includes unauthorized disclosure of sensitive corporate or personal data, unauthorized modification or deletion of critical documentation, and potential disruption of business operations relying on the wiki. Since XWiki is often used in public and private enterprise environments, the impact extends to intellectual property theft, regulatory compliance violations (e.g., GDPR), and reputational damage. The possibility of combining this vulnerability with another (CVE-2022-36092) to achieve exploitation without any authentication further exacerbates the threat, especially for publicly accessible wikis. The availability impact could disrupt internal communications and knowledge sharing, affecting productivity and incident response capabilities. Given the nature of the vulnerability, attackers could also use the compromised wiki as a pivot point to launch further attacks within the network.
Mitigation Recommendations
1. Immediate upgrade to XWiki Platform versions 13.10.6 or 14.4 or later where the vulnerability is patched. 2. If immediate upgrade is not feasible, manually apply the patch to the `Main.Tags` document as provided by the vendor or import the updated document from version 14.4 using the administration UI on versions 10.9 and later. 3. Restrict view rights on the `Main.Tags` document and related tag components to trusted users only, reducing the attack surface. 4. Implement strict network segmentation and access controls to limit exposure of the XWiki platform to untrusted networks and users. 5. Monitor logs for unusual scripting activity or unauthorized access attempts within the wiki environment. 6. Conduct a thorough audit of user permissions to ensure the principle of least privilege is enforced, especially regarding programming rights. 7. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious code injection attempts targeting the wiki. 8. Educate administrators and users about the risks of code injection vulnerabilities and the importance of promptly applying security updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf694f
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 11:35:32 PM
Last updated: 8/7/2025, 11:16:55 AM
Views: 12
Related Threats
CVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumCVE-2025-8929: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-8928: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-34154: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Synergetic Data Systems Inc. UnForm Server Manager
CriticalCVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.