CVE-2022-41928: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform
XWiki Platform vulnerable to Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AttachmentSelector.xml. The issue can also be reproduced by inserting the dangerous payload in the `height` or `alt` macro properties. This has been patched in versions 13.10.7, 14.4.2, and 14.5. The issue can be fixed on a running wiki by updating `XWiki.AttachmentSelector` with the versions below: - 14.5-rc-1+: https://github.com/xwiki/xwiki-platform/commit/eb15147adf94bddb92626f862c1710d45bcd64a7#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23 - 14.4.2+: https://github.com/xwiki/xwiki-platform/commit/c02f8eb1f3c953d124f2c097021536f8bc00fa8d#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23 - 13.10.7+: https://github.com/xwiki/xwiki-platform/commit/efd0df0468d46149ba68b66660b93f31b6318515#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23
AI Analysis
Technical Summary
CVE-2022-41928 is a medium-severity vulnerability classified under CWE-95, which involves improper neutralization of directives in dynamically evaluated code, commonly referred to as 'Eval Injection'. This vulnerability affects the XWiki Platform, specifically in the AttachmentSelector.xml component. The flaw allows an attacker to inject malicious code through certain macro properties such as 'height' or 'alt', which are dynamically evaluated without proper sanitization or neutralization. This improper handling can lead to arbitrary code execution within the context of the XWiki application. The vulnerability exists in versions of XWiki Platform from 5.0-milestone-1 up to but not including 13.10.7, and from 14.0.0 up to but not including 14.4.2. The issue has been addressed in patched versions 13.10.7, 14.4.2, and 14.5, with specific commits available for updating the vulnerable component (XWiki.AttachmentSelector) on running instances. Although no known exploits are currently reported in the wild, the nature of eval injection vulnerabilities typically allows attackers to execute arbitrary code, potentially leading to full compromise of the affected application. The vulnerability arises because user-supplied input is directly evaluated as code without sufficient sanitization, enabling attackers to craft payloads that can manipulate the application logic or execute malicious commands. This type of vulnerability is particularly dangerous in web applications like XWiki that are used for collaborative content management and documentation, as it can lead to unauthorized access, data manipulation, or service disruption.
Potential Impact
For European organizations using XWiki Platform, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their collaborative content and internal documentation. Exploitation could allow attackers to execute arbitrary code on the server hosting the XWiki instance, potentially leading to data theft, unauthorized modification of sensitive documents, or disruption of business operations. Given that XWiki is often deployed in enterprise environments for knowledge management, the compromise could extend to leaking intellectual property or internal communications. Additionally, if the XWiki instance is integrated with other internal systems or identity providers, the attacker might leverage this foothold to pivot laterally within the network. The impact is heightened for organizations that have not applied the patches or mitigations, especially those running vulnerable versions in production. Since no authentication requirement is explicitly stated for exploitation, and the injection vectors are through macro properties that may be user-controllable, the attack surface could be broad, including potentially unauthenticated or low-privileged users. This increases the risk for organizations with public-facing or widely accessible XWiki installations. The absence of known exploits in the wild suggests limited current active exploitation, but the ease of exploitation inherent in eval injection vulnerabilities means that the threat could escalate rapidly once proof-of-concept code becomes available.
Mitigation Recommendations
European organizations should prioritize upgrading their XWiki Platform installations to the patched versions 13.10.7, 14.4.2, or later (including 14.5). If immediate upgrading is not feasible, they should manually update the XWiki.AttachmentSelector component using the provided commits to neutralize the vulnerability. Additionally, organizations should audit their XWiki macros and user inputs to ensure no untrusted data is passed to dynamically evaluated code. Implementing strict input validation and sanitization on all user-controllable fields, especially those related to macro properties like 'height' and 'alt', is critical. Employing web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting eval injection patterns can provide temporary protection. Monitoring logs for unusual macro usage or unexpected code execution attempts within XWiki is recommended to detect potential exploitation attempts. Finally, restricting access to the XWiki platform to trusted users and networks, and enforcing strong authentication and authorization policies, can reduce the attack surface. Regular security assessments and penetration testing focused on dynamic code evaluation points within XWiki should be conducted to identify residual risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2022-41928: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform
Description
XWiki Platform vulnerable to Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AttachmentSelector.xml. The issue can also be reproduced by inserting the dangerous payload in the `height` or `alt` macro properties. This has been patched in versions 13.10.7, 14.4.2, and 14.5. The issue can be fixed on a running wiki by updating `XWiki.AttachmentSelector` with the versions below: - 14.5-rc-1+: https://github.com/xwiki/xwiki-platform/commit/eb15147adf94bddb92626f862c1710d45bcd64a7#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23 - 14.4.2+: https://github.com/xwiki/xwiki-platform/commit/c02f8eb1f3c953d124f2c097021536f8bc00fa8d#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23 - 13.10.7+: https://github.com/xwiki/xwiki-platform/commit/efd0df0468d46149ba68b66660b93f31b6318515#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23
AI-Powered Analysis
Technical Analysis
CVE-2022-41928 is a medium-severity vulnerability classified under CWE-95, which involves improper neutralization of directives in dynamically evaluated code, commonly referred to as 'Eval Injection'. This vulnerability affects the XWiki Platform, specifically in the AttachmentSelector.xml component. The flaw allows an attacker to inject malicious code through certain macro properties such as 'height' or 'alt', which are dynamically evaluated without proper sanitization or neutralization. This improper handling can lead to arbitrary code execution within the context of the XWiki application. The vulnerability exists in versions of XWiki Platform from 5.0-milestone-1 up to but not including 13.10.7, and from 14.0.0 up to but not including 14.4.2. The issue has been addressed in patched versions 13.10.7, 14.4.2, and 14.5, with specific commits available for updating the vulnerable component (XWiki.AttachmentSelector) on running instances. Although no known exploits are currently reported in the wild, the nature of eval injection vulnerabilities typically allows attackers to execute arbitrary code, potentially leading to full compromise of the affected application. The vulnerability arises because user-supplied input is directly evaluated as code without sufficient sanitization, enabling attackers to craft payloads that can manipulate the application logic or execute malicious commands. This type of vulnerability is particularly dangerous in web applications like XWiki that are used for collaborative content management and documentation, as it can lead to unauthorized access, data manipulation, or service disruption.
Potential Impact
For European organizations using XWiki Platform, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their collaborative content and internal documentation. Exploitation could allow attackers to execute arbitrary code on the server hosting the XWiki instance, potentially leading to data theft, unauthorized modification of sensitive documents, or disruption of business operations. Given that XWiki is often deployed in enterprise environments for knowledge management, the compromise could extend to leaking intellectual property or internal communications. Additionally, if the XWiki instance is integrated with other internal systems or identity providers, the attacker might leverage this foothold to pivot laterally within the network. The impact is heightened for organizations that have not applied the patches or mitigations, especially those running vulnerable versions in production. Since no authentication requirement is explicitly stated for exploitation, and the injection vectors are through macro properties that may be user-controllable, the attack surface could be broad, including potentially unauthenticated or low-privileged users. This increases the risk for organizations with public-facing or widely accessible XWiki installations. The absence of known exploits in the wild suggests limited current active exploitation, but the ease of exploitation inherent in eval injection vulnerabilities means that the threat could escalate rapidly once proof-of-concept code becomes available.
Mitigation Recommendations
European organizations should prioritize upgrading their XWiki Platform installations to the patched versions 13.10.7, 14.4.2, or later (including 14.5). If immediate upgrading is not feasible, they should manually update the XWiki.AttachmentSelector component using the provided commits to neutralize the vulnerability. Additionally, organizations should audit their XWiki macros and user inputs to ensure no untrusted data is passed to dynamically evaluated code. Implementing strict input validation and sanitization on all user-controllable fields, especially those related to macro properties like 'height' and 'alt', is critical. Employing web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting eval injection patterns can provide temporary protection. Monitoring logs for unusual macro usage or unexpected code execution attempts within XWiki is recommended to detect potential exploitation attempts. Finally, restricting access to the XWiki platform to trusted users and networks, and enforcing strong authentication and authorization policies, can reduce the attack surface. Regular security assessments and penetration testing focused on dynamic code evaluation points within XWiki should be conducted to identify residual risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-30T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6d7c
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 8:53:04 PM
Last updated: 7/31/2025, 6:41:33 PM
Views: 9
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.