Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26000: CWE-1021: Improper Restriction of Rendered UI Layers or Frames in xwiki xwiki-platform

0
Medium
VulnerabilityCVE-2026-26000cvecve-2026-26000cwe-1021
Published: Thu Feb 12 2026 (02/12/2026, 20:30:07 UTC)
Source: CVE Database V5
Vendor/Project: xwiki
Product: xwiki-platform

Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Prior to 17.9.0, 17.4.6, and 16.10.13, it's possible using comments to inject CSS that would transform the full wiki in a link area leading to a malicious page. This vulnerability is fixed in 17.9.0, 17.4.6, and 16.10.13.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 21:03:44 UTC

Technical Analysis

CVE-2026-26000 is a vulnerability in the XWiki Platform, a widely used generic wiki platform that provides runtime services for applications. The flaw exists in versions prior to 17.9.0, 17.4.6, and 16.10.13, where an attacker can inject malicious CSS code through the comments feature. This CSS injection manipulates the rendered UI layers, effectively transforming the entire wiki interface into a large clickable link that redirects users to an attacker-controlled malicious webpage. The root cause is improper restriction of rendered UI layers or frames, classified under CWE-1021. The vulnerability does not require any privileges or authentication to exploit, but it does require user interaction, as users must view or interact with the manipulated wiki page to be redirected. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low complexity, no privileges required, but user interaction needed, and limited impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the attack vector enables phishing and social engineering by leveraging trusted wiki content to lure users to malicious sites. The vulnerability is fixed in versions 17.9.0, 17.4.6, and 16.10.13. Organizations running affected versions should upgrade promptly to mitigate risk.

Potential Impact

For European organizations, this vulnerability can facilitate phishing attacks and social engineering by turning trusted internal or public wiki pages into malicious redirectors. This can lead to credential theft, malware delivery, or unauthorized access if users are redirected to attacker-controlled sites. The impact on confidentiality, integrity, and availability is limited directly, but the indirect consequences through user deception can be significant. Organizations relying on XWiki for documentation, collaboration, or knowledge management—especially in sectors like government, education, and enterprises—may face reputational damage and operational disruption if exploited. The vulnerability's ease of exploitation without authentication increases risk, especially in environments where user awareness is low or where wiki content is widely accessible. Since no known exploits are currently active, proactive patching can prevent potential attacks.

Mitigation Recommendations

1. Upgrade all affected XWiki Platform instances to versions 17.9.0, 17.4.6, or 16.10.13 or later, where the vulnerability is patched. 2. Implement strict input validation and sanitization on comment fields to prevent CSS or other code injection, using a whitelist approach for allowed content. 3. Employ Content Security Policy (CSP) headers to restrict the execution of injected styles or scripts and limit the domains to which users can be redirected. 4. Educate users about the risks of clicking unexpected links within internal wiki pages and encourage verification of URLs before interaction. 5. Monitor wiki logs for unusual comment submissions or sudden changes in UI behavior that could indicate attempted exploitation. 6. Consider disabling or restricting comment functionality if not essential, or limit comment posting permissions to trusted users. 7. Regularly audit and update third-party components and dependencies to reduce exposure to similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T17:41:55.859Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698e3cc8c9e1ff5ad81239f6

Added to database: 2/12/2026, 8:49:12 PM

Last enriched: 2/12/2026, 9:03:44 PM

Last updated: 3/29/2026, 8:51:06 PM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses