Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24128: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in xwiki xwiki-platform

0
Medium
VulnerabilityCVE-2026-24128cvecve-2026-24128cwe-79cwe-80
Published: Fri Jan 23 2026 (01/23/2026, 23:18:31 UTC)
Source: CVE Database V5
Vendor/Project: xwiki
Product: xwiki-platform

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Versions 7.0-milestone-2 through 16.10.11, 17.0.0-rc-1 through 17.4.4, and 17.5.0-rc-1 through 17.7.0 contain a reflected Cross-site Scripting (XSS) vulnerability, which allows an attacker to craft a malicious URL and execute arbitrary actions with the same privileges as the victim. If the victim has administrative or programming rights, those rights can be exploited to gain full access to the XWiki installation. This issue has been patched in versions 17.8.0-rc-1, 17.4.5 and 16.10.12. To workaround, the patch can be applied manually, only a single line in templates/logging_macros.vm needs to be changed, no restart is required.

AI-Powered Analysis

AILast updated: 01/31/2026, 08:49:58 UTC

Technical Analysis

The XWiki Platform, a widely used generic wiki platform for building collaborative applications, suffers from a reflected Cross-site Scripting (XSS) vulnerability identified as CVE-2026-24128. This vulnerability arises due to improper neutralization of input during web page generation, specifically in the templates/logging_macros.vm file, which fails to sanitize user-supplied data correctly. Attackers can craft malicious URLs that, when visited by a victim, cause arbitrary JavaScript code execution within the victim’s browser session. This can lead to session hijacking, theft of sensitive information, or unauthorized actions performed with the victim’s privileges. The risk escalates significantly if the victim holds administrative or programming rights within the XWiki instance, as attackers could leverage the XSS to gain full control over the platform, including data manipulation, configuration changes, or further pivoting within the environment. The vulnerability affects multiple versions spanning from 7.0-milestone-2 through 16.10.11, 17.0.0-rc-1 through 17.4.4, and 17.5.0-rc-1 through 17.7.0. The vendor has released patches in versions 16.10.12, 17.4.5, and 17.8.0-rc-1 to address this issue. Mitigation can also be achieved by manually applying a one-line fix in the affected template file without requiring a service restart. The vulnerability does not require authentication or elevated privileges to exploit but does require user interaction, such as clicking a malicious link. No public exploits have been reported to date, but the high impact potential on privileged users makes timely remediation critical.

Potential Impact

For European organizations using XWiki Platform, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their collaborative content and applications. Exploitation could lead to unauthorized disclosure of sensitive corporate information, defacement or manipulation of wiki content, and potential lateral movement within the network if administrative privileges are compromised. Organizations relying on XWiki for internal documentation, knowledge management, or application runtime services may face operational disruptions and reputational damage. The risk is amplified in sectors with stringent data protection requirements such as finance, healthcare, and government institutions. Additionally, since XWiki is often used in multi-user environments, the attack surface is broad, and phishing campaigns leveraging this vulnerability could target employees to gain elevated access. The absence of known exploits in the wild currently reduces immediate risk, but the medium severity score and ease of exploitation via crafted URLs necessitate proactive patching and monitoring.

Mitigation Recommendations

European organizations should prioritize upgrading affected XWiki Platform instances to the patched versions 16.10.12, 17.4.5, or 17.8.0-rc-1 as soon as possible. If immediate upgrading is not feasible, apply the manual patch by modifying the single line in templates/logging_macros.vm as specified by the vendor, which does not require a restart, to mitigate the vulnerability. Implement strict input validation and output encoding in any custom extensions or templates to prevent similar XSS issues. Employ web application firewalls (WAFs) with rules to detect and block reflected XSS attack patterns targeting XWiki URLs. Conduct user awareness training to reduce the risk of successful phishing attacks involving malicious URLs. Monitor logs for unusual URL access patterns and suspicious user activities, especially from accounts with elevated privileges. Regularly review and minimize the number of users with administrative or programming rights to limit potential damage from compromised accounts. Finally, consider deploying Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the XWiki web application context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-21T18:38:22.473Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697405dd4623b1157c69e7b5

Added to database: 1/23/2026, 11:35:57 PM

Last enriched: 1/31/2026, 8:49:58 AM

Last updated: 2/7/2026, 12:27:36 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats