{"containers":{"cna":{"affected":[{"product":"xwiki-platform","vendor":"xwiki","versions":[{"status":"affected","version":">= 5.4.4, <= 6.0-milestone-2"},{"status":"affected","version":">= 6.0-milestone-2, < 12.10.11"},{"status":"affected","version":">= 13.0.0, < 13.4.7"},{"status":"affected","version":">= 13.5.0, < 13.10.3"}]}],"descriptions":[{"lang":"en","value":"XWiki Platform Filter UI provides a generic user interface to convert from a XWiki Filter input stream to an output stream with settings for each stream. Starting with versions 6.0-milestone-2 and 5.4.4 and prior to versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3, XWiki Platform Filter UI contains a possible cross-site scripting vector in the `Filter.FilterStreamDescriptorForm` wiki page related to pretty much all the form fields printed in the home page of the application. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest workaround is to edit the wiki page `Filter.FilterStreamDescriptorForm` (with wiki editor) according to the instructions in the GitHub Security Advisory."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-80","description":"CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-116","description":"CWE-116: Improper Encoding or Escaping of Output","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-05-31T16:45:11.000Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xjfw-5vv5-vjq2"},{"tags":["x_refsource_MISC"],"url":"https://github.com/xwiki/xwiki-platform/commit/21906acb5ee2304552f56f9bbdbf8e7d368f7f3a"},{"tags":["x_refsource_MISC"],"url":"https://jira.xwiki.org/browse/XWIKI-19293"}],"source":{"advisory":"GHSA-xjfw-5vv5-vjq2","discovery":"UNKNOWN"},"title":"Cross-site Scripting in Filter Stream Converter Application in XWiki Platform","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-29258","STATE":"PUBLIC","TITLE":"Cross-site Scripting in Filter Stream Converter Application in XWiki Platform"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"xwiki-platform","version":{"version_data":[{"version_value":">= 5.4.4, <= 6.0-milestone-2"},{"version_value":">= 6.0-milestone-2, < 12.10.11"},{"version_value":">= 13.0.0, < 13.4.7"},{"version_value":">= 13.5.0, < 13.10.3"}]}}]},"vendor_name":"xwiki"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"XWiki Platform Filter UI provides a generic user interface to convert from a XWiki Filter input stream to an output stream with settings for each stream. Starting with versions 6.0-milestone-2 and 5.4.4 and prior to versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3, XWiki Platform Filter UI contains a possible cross-site scripting vector in the `Filter.FilterStreamDescriptorForm` wiki page related to pretty much all the form fields printed in the home page of the application. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest workaround is to edit the wiki page `Filter.FilterStreamDescriptorForm` (with wiki editor) according to the instructions in the GitHub Security Advisory."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)"}]},{"description":[{"lang":"eng","value":"CWE-116: Improper Encoding or Escaping of Output"}]}]},"references":{"reference_data":[{"name":"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xjfw-5vv5-vjq2","refsource":"CONFIRM","url":"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xjfw-5vv5-vjq2"},{"name":"https://github.com/xwiki/xwiki-platform/commit/21906acb5ee2304552f56f9bbdbf8e7d368f7f3a","refsource":"MISC","url":"https://github.com/xwiki/xwiki-platform/commit/21906acb5ee2304552f56f9bbdbf8e7d368f7f3a"},{"name":"https://jira.xwiki.org/browse/XWIKI-19293","refsource":"MISC","url":"https://jira.xwiki.org/browse/XWIKI-19293"}]},"source":{"advisory":"GHSA-xjfw-5vv5-vjq2","discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T06:17:54.474Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xjfw-5vv5-vjq2"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/xwiki/xwiki-platform/commit/21906acb5ee2304552f56f9bbdbf8e7d368f7f3a"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://jira.xwiki.org/browse/XWIKI-19293"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T14:06:30.692930Z","id":"CVE-2022-29258","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-23T18:21:07.259Z"}}]},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2022-29258","datePublished":"2022-05-31T16:45:11.000Z","dateReserved":"2022-04-13T00:00:00.000Z","dateUpdated":"2025-04-23T18:21:07.259Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}