CVE-2022-41930: CWE-862: Missing Authorization in xwiki xwiki-platform
org.xwiki.platform:xwiki-platform-user-profile-ui is missing authorization to enable or disable users. Any user (logged in or not) with access to the page XWiki.XWikiUserProfileSheet can enable or disable any user profile. This might allow to a disabled user to re-enable themselves, or to an attacker to disable any user of the wiki. The problem has been patched in XWiki 13.10.7, 14.5RC1 and 14.4.2. Workarounds: The problem can be patched immediately by editing the page `XWiki.XWikiUserProfileSheet` in the wiki and by performing the changes contained in https://github.com/xwiki/xwiki-platform/commit/5be1cc0adf917bf10899c47723fa451e950271fa.
AI Analysis
Technical Summary
CVE-2022-41930 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the XWiki platform, specifically the component org.xwiki.platform:xwiki-platform-user-profile-ui. The vulnerability arises because the user profile management page (XWiki.XWikiUserProfileSheet) lacks proper authorization controls. This flaw allows any user, whether authenticated or unauthenticated, who can access this page to enable or disable any user profile within the wiki. Consequently, a disabled user could re-enable their own account without administrative approval, or an attacker could disable arbitrary user accounts, potentially disrupting legitimate user access and administrative control. The vulnerability affects XWiki platform versions starting from 12.4 up to but not including 13.10.7, and from 14.0.0 up to but not including 14.4.2. The issue has been addressed in versions 13.10.7, 14.4.2, and 14.5RC1. Immediate mitigation is possible by manually editing the XWiki.XWikiUserProfileSheet page to implement the authorization fixes as detailed in the referenced GitHub commit (https://github.com/xwiki/xwiki-platform/commit/5be1cc0adf917bf10899c47723fa451e950271fa). There are no known exploits in the wild at this time, but the vulnerability's nature allows for potential misuse by unauthorized users, making it a significant risk if left unpatched. The vulnerability impacts the confidentiality and integrity of user account management and can affect availability by disabling user accounts, but it does not require authentication or user interaction to exploit, increasing its risk profile.
Potential Impact
For European organizations using the XWiki platform, this vulnerability poses a risk to user account integrity and operational continuity. Attackers could disable critical user accounts, including administrators, leading to denial of service for legitimate users and potential disruption of collaborative workflows. Additionally, unauthorized re-enablement of disabled accounts could undermine internal security policies and audit controls. Organizations relying on XWiki for knowledge management, documentation, or internal collaboration may face operational delays and increased administrative overhead to restore proper access controls. The lack of authentication requirement for exploitation increases the threat surface, especially for publicly accessible XWiki instances. This could lead to reputational damage, compliance issues (especially under GDPR if user data integrity is compromised), and potential insider threat scenarios if attackers manipulate user states to escalate privileges or bypass controls.
Mitigation Recommendations
1. Upgrade affected XWiki platform instances to versions 13.10.7, 14.4.2, or later where the vulnerability is patched. 2. If immediate upgrade is not feasible, apply the manual patch by editing the XWiki.XWikiUserProfileSheet page as per the official GitHub commit to enforce proper authorization. 3. Restrict access to the XWiki.XWikiUserProfileSheet page using XWiki's access control mechanisms to limit who can view or modify user profiles, ideally to trusted administrators only. 4. Monitor user account status changes closely through audit logs and set up alerts for unusual enable/disable activities. 5. Implement network-level protections such as IP whitelisting or VPN access for administrative interfaces to reduce exposure. 6. Conduct regular security reviews and penetration testing focused on authorization controls within the XWiki platform. 7. Educate administrators and users about the risk and encourage prompt reporting of suspicious account behavior.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2022-41930: CWE-862: Missing Authorization in xwiki xwiki-platform
Description
org.xwiki.platform:xwiki-platform-user-profile-ui is missing authorization to enable or disable users. Any user (logged in or not) with access to the page XWiki.XWikiUserProfileSheet can enable or disable any user profile. This might allow to a disabled user to re-enable themselves, or to an attacker to disable any user of the wiki. The problem has been patched in XWiki 13.10.7, 14.5RC1 and 14.4.2. Workarounds: The problem can be patched immediately by editing the page `XWiki.XWikiUserProfileSheet` in the wiki and by performing the changes contained in https://github.com/xwiki/xwiki-platform/commit/5be1cc0adf917bf10899c47723fa451e950271fa.
AI-Powered Analysis
Technical Analysis
CVE-2022-41930 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the XWiki platform, specifically the component org.xwiki.platform:xwiki-platform-user-profile-ui. The vulnerability arises because the user profile management page (XWiki.XWikiUserProfileSheet) lacks proper authorization controls. This flaw allows any user, whether authenticated or unauthenticated, who can access this page to enable or disable any user profile within the wiki. Consequently, a disabled user could re-enable their own account without administrative approval, or an attacker could disable arbitrary user accounts, potentially disrupting legitimate user access and administrative control. The vulnerability affects XWiki platform versions starting from 12.4 up to but not including 13.10.7, and from 14.0.0 up to but not including 14.4.2. The issue has been addressed in versions 13.10.7, 14.4.2, and 14.5RC1. Immediate mitigation is possible by manually editing the XWiki.XWikiUserProfileSheet page to implement the authorization fixes as detailed in the referenced GitHub commit (https://github.com/xwiki/xwiki-platform/commit/5be1cc0adf917bf10899c47723fa451e950271fa). There are no known exploits in the wild at this time, but the vulnerability's nature allows for potential misuse by unauthorized users, making it a significant risk if left unpatched. The vulnerability impacts the confidentiality and integrity of user account management and can affect availability by disabling user accounts, but it does not require authentication or user interaction to exploit, increasing its risk profile.
Potential Impact
For European organizations using the XWiki platform, this vulnerability poses a risk to user account integrity and operational continuity. Attackers could disable critical user accounts, including administrators, leading to denial of service for legitimate users and potential disruption of collaborative workflows. Additionally, unauthorized re-enablement of disabled accounts could undermine internal security policies and audit controls. Organizations relying on XWiki for knowledge management, documentation, or internal collaboration may face operational delays and increased administrative overhead to restore proper access controls. The lack of authentication requirement for exploitation increases the threat surface, especially for publicly accessible XWiki instances. This could lead to reputational damage, compliance issues (especially under GDPR if user data integrity is compromised), and potential insider threat scenarios if attackers manipulate user states to escalate privileges or bypass controls.
Mitigation Recommendations
1. Upgrade affected XWiki platform instances to versions 13.10.7, 14.4.2, or later where the vulnerability is patched. 2. If immediate upgrade is not feasible, apply the manual patch by editing the XWiki.XWikiUserProfileSheet page as per the official GitHub commit to enforce proper authorization. 3. Restrict access to the XWiki.XWikiUserProfileSheet page using XWiki's access control mechanisms to limit who can view or modify user profiles, ideally to trusted administrators only. 4. Monitor user account status changes closely through audit logs and set up alerts for unusual enable/disable activities. 5. Implement network-level protections such as IP whitelisting or VPN access for administrative interfaces to reduce exposure. 6. Conduct regular security reviews and penetration testing focused on authorization controls within the XWiki platform. 7. Educate administrators and users about the risk and encourage prompt reporting of suspicious account behavior.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-30T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6d86
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 8:52:41 PM
Last updated: 2/7/2026, 8:40:12 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.