CVE-2024-55663
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
12/12/2024
Last modified:
10/01/2025
Description
XWiki Platform is a generic wiki platform. Starting in version 6.3-milestone-2 and prior to versions 13.10.5 and 14.3-rc-1, in `getdocument.vm`; the ordering of the returned documents is defined from an unsanitized request parameter (request.sort) and can allow any user to inject HQL. Depending on the used database backend, the attacker may be able to not only obtain confidential information such as password hashes from the database, but also execute UPDATE/INSERT/DELETE queries. This has been patched in 13.10.5 and 14.3-rc-1. There is no known workaround, other than upgrading XWiki.
Impact
Base Score 4.0
8.60
Severity 4.0
HIGH
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | 6.4 (including) | 13.10.5 (excluding) |
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | 14.0 (including) | 14.3 (excluding) |
cpe:2.3:a:xwiki:xwiki:6.3:-:*:*:*:*:*:* | ||
cpe:2.3:a:xwiki:xwiki:6.3:milestone2:*:*:*:*:*:* | ||
cpe:2.3:a:xwiki:xwiki:6.3:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page