{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-43400","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-08-12T18:02:04.965Z","datePublished":"2024-08-19T16:24:40.900Z","dateUpdated":"2024-08-22T14:00:37.297Z"},"containers":{"cna":{"title":"XWiki Platform allows XSS through XClass name in string properties","problemTypes":[{"descriptions":[{"cweId":"CWE-96","lang":"en","description":"CWE-96: Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-wcg9-pgqv-xm5v","tags":["x_refsource_CONFIRM"],"url":"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-wcg9-pgqv-xm5v"},{"name":"https://github.com/xwiki/xwiki-platform/commit/27eca8423fc1ad177518077a733076821268509c","tags":["x_refsource_MISC"],"url":"https://github.com/xwiki/xwiki-platform/commit/27eca8423fc1ad177518077a733076821268509c"},{"name":"https://jira.xwiki.org/browse/XWIKI-21810","tags":["x_refsource_MISC"],"url":"https://jira.xwiki.org/browse/XWIKI-21810"}],"affected":[{"vendor":"xwiki","product":"xwiki-platform","versions":[{"version":">= 15.6-rc-1, < 15.10.2","status":"affected"},{"version":">= 15.0-rc-1, < 15.5.5","status":"affected"},{"version":"< 14.10.21","status":"affected"},{"version":"= 16.0.0-rc-1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-08-20T16:00:37.079Z"},"descriptions":[{"lang":"en","value":"XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It is possible for a user without Script or Programming rights to craft a URL pointing to a page with arbitrary JavaScript. This requires social engineer to trick a user to follow the URL. This has been patched in XWiki 14.10.21, 15.5.5, 15.10.6 and 16.0.0."}],"source":{"advisory":"GHSA-wcg9-pgqv-xm5v","discovery":"UNKNOWN"}},"adp":[{"affected":[{"vendor":"xwiki","product":"xwiki-platform","cpes":["cpe:2.3:a:xwiki:xwiki-platform:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"15.6-rc-1","status":"affected","lessThan":"15.10.2","versionType":"custom"},{"version":"15.0-rc-1","status":"affected","lessThan":"15.5.5","versionType":"custom"},{"version":"0","status":"affected","lessThan":"14.10.21","versionType":"custom"}]},{"vendor":"xwiki","product":"xwiki-platform","cpes":["cpe:2.3:a:xwiki:xwiki-platform:16.0.0-rc-1:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"16.0.0-rc-1","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-19T17:17:50.141081Z","id":"CVE-2024-43400","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-22T14:00:37.297Z"}}]}}