Skip to main content

CVE-2023-50723: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform

Critical
VulnerabilityCVE-2023-50723cvecve-2023-50723cwe-95cwe-94
Published: Fri Dec 15 2023 (12/15/2023, 19:02:57 UTC)
Source: CVE
Vendor/Project: xwiki
Product: xwiki-platform

Description

XWiki Platform is a generic wiki platform. Starting in 2.3 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, anyone who can edit an arbitrary wiki page in an XWiki installation can gain programming right through several cases of missing escaping in the code for displaying sections in the administration interface. This impacts the confidentiality, integrity and availability of the whole XWiki installation. Normally, all users are allowed to edit their own user profile so this should be exploitable by all users of the XWiki instance. This has been fixed in XWiki 14.10.15, 15.5.2 and 15.7RC1. The patches can be manually applied to the `XWiki.ConfigurableClassMacros` and `XWiki.ConfigurableClass` pages.

AI-Powered Analysis

AILast updated: 07/05/2025, 08:41:49 UTC

Technical Analysis

CVE-2023-50723 is a critical security vulnerability affecting the XWiki Platform, a widely used generic wiki platform. The flaw is classified under CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code, commonly known as 'Eval Injection') and CWE-94 (Improper Control of Generation of Code). This vulnerability exists in versions starting from 2.3 up to versions prior to 14.10.15, 15.5.2, and 15.7-rc-1. The root cause is missing escaping in the code responsible for displaying sections in the administration interface, specifically in the `XWiki.ConfigurableClassMacros` and `XWiki.ConfigurableClass` pages. This improper neutralization allows an attacker who can edit any arbitrary wiki page to inject malicious code that is dynamically evaluated by the platform. Since all users typically have permission to edit their own user profiles, this vulnerability is exploitable by any authenticated user without requiring additional privileges or user interaction. Successful exploitation grants the attacker programming rights within the XWiki instance, enabling them to execute arbitrary code, manipulate data, and potentially take full control of the wiki installation. This leads to a complete compromise of confidentiality, integrity, and availability of the affected system. The vulnerability has been assigned a CVSS v3.1 score of 10.0, indicating a critical severity level. Patches addressing this issue were released in versions 14.10.15, 15.5.2, and 15.7-rc-1. Organizations can also manually apply patches to the affected pages to mitigate the risk. No known exploits have been reported in the wild as of the publication date, but the ease of exploitation and the critical impact make it a high-priority issue for remediation.

Potential Impact

For European organizations using XWiki Platform, this vulnerability poses a severe risk. Since XWiki is often deployed for internal documentation, collaboration, and knowledge management, a compromise could lead to unauthorized disclosure of sensitive corporate information, intellectual property theft, and disruption of business operations. Attackers gaining programming rights can alter or delete critical content, inject malicious scripts to target other internal systems, or use the compromised wiki as a foothold for lateral movement within the network. The vulnerability affects confidentiality, integrity, and availability simultaneously, making it a comprehensive threat. Given that many European organizations rely on open-source collaboration tools like XWiki, especially in sectors such as government, education, and research, the potential for data breaches and operational disruptions is significant. Furthermore, compliance with GDPR and other data protection regulations could be jeopardized if personal or sensitive data stored in the wiki is exposed or manipulated. The lack of requirement for elevated privileges or user interaction increases the likelihood of exploitation in environments where user profile editing is enabled by default.

Mitigation Recommendations

European organizations should prioritize upgrading their XWiki Platform installations to versions 14.10.15, 15.5.2, 15.7-rc-1, or later, where the vulnerability is patched. If immediate upgrading is not feasible, manual application of patches to the `XWiki.ConfigurableClassMacros` and `XWiki.ConfigurableClass` pages should be performed to neutralize the vulnerability. Administrators should audit user permissions to restrict editing capabilities, especially for users who do not require profile editing rights, to reduce the attack surface. Implementing strict input validation and escaping mechanisms in custom wiki macros or scripts can further mitigate injection risks. Monitoring and logging of wiki page edits, particularly those involving administrative or configuration pages, should be enhanced to detect suspicious activities promptly. Network segmentation and limiting access to the wiki platform to trusted internal networks or VPN users can reduce exposure. Additionally, organizations should conduct regular security assessments and penetration testing focused on wiki platforms to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2023-12-11T17:53:36.031Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8b7e

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 8:41:49 AM

Last updated: 7/27/2025, 12:53:07 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats