CVE-2022-41935: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in xwiki xwiki-platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users without the right to view documents can deduce their existence by repeated Livetable queries. The issue has been patched in XWiki 14.6RC1, 13.10.8, and 14.4.3, the response is not properly cleaned up of obfuscated entries. As a workaround, The patch for the document `XWiki.LiveTableResultsMacros` can be manually applied or a XAR archive of a patched version can be imported, on versions 12.10.11, 13.9-rc-1, and 13.4.4. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-41935 is a vulnerability in the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability is classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors. Specifically, the issue arises because users who do not have the appropriate permissions to view certain documents can still infer the existence of these documents by performing repeated Livetable queries. Livetable is a feature in XWiki that allows dynamic querying and display of wiki content. Due to improper sanitization and response handling, obfuscated entries that should not be visible to unauthorized users are leaked, enabling them to deduce sensitive information about document existence and potentially other metadata. This vulnerability affects multiple versions of XWiki Platform, notably versions from 12.10.11 up to but not including 13.10.8, and from 14.0.0 up to but not including 14.4.3. The vendor has addressed the issue in versions 14.6RC1, 13.10.8, and 14.4.3. However, for versions 12.10.11, 13.9-rc-1, and 13.4.4, a manual patch can be applied by updating the document `XWiki.LiveTableResultsMacros` or importing a patched XAR archive. No other workarounds are known. There are no reports of active exploitation in the wild, but the vulnerability's nature means it could be leveraged by attackers to gather intelligence about internal documents and system structure, which could facilitate further attacks such as social engineering or privilege escalation. The vulnerability does not require authentication to exploit, as unauthorized users can perform Livetable queries, but it does require access to the platform interface where Livetable queries can be executed.
Potential Impact
For European organizations using affected versions of XWiki Platform, this vulnerability poses a risk of unauthorized information disclosure. Sensitive internal documents or metadata could be inferred by attackers or unauthorized users, potentially exposing confidential business information, project details, or personal data. This exposure undermines confidentiality and could lead to reputational damage, regulatory non-compliance (especially under GDPR if personal data is involved), and increased risk of targeted attacks. While the vulnerability does not directly allow modification or deletion of data, the leakage of document existence and related metadata can be a stepping stone for attackers to craft more precise attacks, including phishing or social engineering campaigns. Organizations in sectors with high confidentiality requirements, such as government, finance, healthcare, and critical infrastructure, are particularly at risk. The impact on availability and integrity is low, but the breach of confidentiality alone is significant given the potential sensitivity of the leaked information.
Mitigation Recommendations
European organizations should prioritize upgrading affected XWiki Platform instances to the patched versions: 13.10.8, 14.4.3, or later stable releases such as 14.6RC1. If immediate upgrade is not feasible, the manual patch involving the `XWiki.LiveTableResultsMacros` document should be applied promptly to versions 12.10.11, 13.9-rc-1, or 13.4.4. Administrators should audit their XWiki deployments to identify affected versions and verify whether the patch has been applied. Additionally, organizations should restrict access to the Livetable query interface to trusted users only, potentially by implementing network-level access controls or application-level restrictions. Monitoring and logging of Livetable query usage should be enhanced to detect unusual or repeated queries that may indicate exploitation attempts. Regular security assessments and penetration testing should include checks for this vulnerability. Finally, organizations should review and tighten overall access control policies within XWiki to minimize the risk of unauthorized information disclosure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2022-41935: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in xwiki xwiki-platform
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users without the right to view documents can deduce their existence by repeated Livetable queries. The issue has been patched in XWiki 14.6RC1, 13.10.8, and 14.4.3, the response is not properly cleaned up of obfuscated entries. As a workaround, The patch for the document `XWiki.LiveTableResultsMacros` can be manually applied or a XAR archive of a patched version can be imported, on versions 12.10.11, 13.9-rc-1, and 13.4.4. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-41935 is a vulnerability in the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications built on top of it. The vulnerability is classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors. Specifically, the issue arises because users who do not have the appropriate permissions to view certain documents can still infer the existence of these documents by performing repeated Livetable queries. Livetable is a feature in XWiki that allows dynamic querying and display of wiki content. Due to improper sanitization and response handling, obfuscated entries that should not be visible to unauthorized users are leaked, enabling them to deduce sensitive information about document existence and potentially other metadata. This vulnerability affects multiple versions of XWiki Platform, notably versions from 12.10.11 up to but not including 13.10.8, and from 14.0.0 up to but not including 14.4.3. The vendor has addressed the issue in versions 14.6RC1, 13.10.8, and 14.4.3. However, for versions 12.10.11, 13.9-rc-1, and 13.4.4, a manual patch can be applied by updating the document `XWiki.LiveTableResultsMacros` or importing a patched XAR archive. No other workarounds are known. There are no reports of active exploitation in the wild, but the vulnerability's nature means it could be leveraged by attackers to gather intelligence about internal documents and system structure, which could facilitate further attacks such as social engineering or privilege escalation. The vulnerability does not require authentication to exploit, as unauthorized users can perform Livetable queries, but it does require access to the platform interface where Livetable queries can be executed.
Potential Impact
For European organizations using affected versions of XWiki Platform, this vulnerability poses a risk of unauthorized information disclosure. Sensitive internal documents or metadata could be inferred by attackers or unauthorized users, potentially exposing confidential business information, project details, or personal data. This exposure undermines confidentiality and could lead to reputational damage, regulatory non-compliance (especially under GDPR if personal data is involved), and increased risk of targeted attacks. While the vulnerability does not directly allow modification or deletion of data, the leakage of document existence and related metadata can be a stepping stone for attackers to craft more precise attacks, including phishing or social engineering campaigns. Organizations in sectors with high confidentiality requirements, such as government, finance, healthcare, and critical infrastructure, are particularly at risk. The impact on availability and integrity is low, but the breach of confidentiality alone is significant given the potential sensitivity of the leaked information.
Mitigation Recommendations
European organizations should prioritize upgrading affected XWiki Platform instances to the patched versions: 13.10.8, 14.4.3, or later stable releases such as 14.6RC1. If immediate upgrade is not feasible, the manual patch involving the `XWiki.LiveTableResultsMacros` document should be applied promptly to versions 12.10.11, 13.9-rc-1, or 13.4.4. Administrators should audit their XWiki deployments to identify affected versions and verify whether the patch has been applied. Additionally, organizations should restrict access to the Livetable query interface to trusted users only, potentially by implementing network-level access controls or application-level restrictions. Monitoring and logging of Livetable query usage should be enhanced to detect unusual or repeated queries that may indicate exploitation attempts. Regular security assessments and penetration testing should include checks for this vulnerability. Finally, organizations should review and tighten overall access control policies within XWiki to minimize the risk of unauthorized information disclosure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-30T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6d92
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 8:39:22 PM
Last updated: 7/31/2025, 4:51:57 AM
Views: 7
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.