Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-pjhg-9wr9-rj96: org.xwiki.platform:xwiki-platform-wysiwyg-api Open Redirect vulnerability

Impact

An open redirect vulnerability in the HTML conversion request filter allows attackers to construct URLs on an XWiki instance that redirect to any URL. To reproduce, open <xwiki-host>/xwiki/bin/view/Main/?foo=bar&foo_syntax=invalid&RequiresHTMLConversion=foo&xerror=https://www.example.com/ where <xwiki-host> is the URL of your XWiki installation.

Patches

This bug has been fixed in XWiki 15.10.13, 16.4.4 and 16.8.0 by validating the domain of the redirect URL against the configured safe domains and the current request’s domain.

Workarounds

A web application firewall could be configured to reject requests with the xerror parameter as from our analysis this parameter isn’t used anymore. For requests with the RequiresHTMLConversion parameter set, the referrer URL should be checked if it points to the XWiki installation. Apart from that, we’re not aware of any workarounds.

ghsa
#vulnerability#web#git#java#jira#maven
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2025-32970

org.xwiki.platform:xwiki-platform-wysiwyg-api Open Redirect vulnerability

Moderate severity GitHub Reviewed Published Apr 29, 2025 in xwiki/xwiki-platform • Updated Apr 29, 2025

Package

maven org.xwiki.platform:xwiki-platform-wysiwyg-api (Maven)

Affected versions

>= 13.5-rc-1, < 15.10.13

>= 16.0.0-rc-1, < 16.4.4

>= 16.5.0-rc-1, < 16.8.0

Patched versions

15.10.13

16.4.4

16.8.0

Impact

An open redirect vulnerability in the HTML conversion request filter allows attackers to construct URLs on an XWiki instance that redirect to any URL. To reproduce, open <xwiki-host>/xwiki/bin/view/Main/?foo=bar&foo_syntax=invalid&RequiresHTMLConversion=foo&xerror=https://www.example.com/ where <xwiki-host> is the URL of your XWiki installation.

Patches

This bug has been fixed in XWiki 15.10.13, 16.4.4 and 16.8.0 by validating the domain of the redirect URL against the configured safe domains and the current request’s domain.

Workarounds

A web application firewall could be configured to reject requests with the xerror parameter as from our analysis this parameter isn’t used anymore. For requests with the RequiresHTMLConversion parameter set, the referrer URL should be checked if it points to the XWiki installation. Apart from that, we’re not aware of any workarounds.

References

  • GHSA-pjhg-9wr9-rj96
  • xwiki/xwiki-platform@6dab790
  • https://jira.xwiki.org/browse/XWIKI-22487

Published to the GitHub Advisory Database

Apr 29, 2025

Last updated

Apr 29, 2025

ghsa: Latest News

GHSA-9fwj-9mjf-rhj3: laravel-auth0 SDK Vulnerable to Brute Force Authentication Tags of CookieStore Sessions