CVE-2025-49587 – org.xwiki.platform:xwiki-platform-notifications-notifiers-default
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-notifications-notifiers-default
Vulnerable Version: >=15.9-rc-1 <15.10.16 || >=16.0.0-rc-1 <16.4.7 || >=16.5.0-rc-1 <16.10.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
EPSS: 0.00159 pctl0.37351
Details
XWiki does not require right warnings for notification displayer objects ### Impact When a user without script right creates a document with an `XWiki.Notifications.Code.NotificationDisplayerClass` object, and later an admin edits and saves that document, the possibly malicious content of that object is output as raw HTML, allowing XSS attacks. While the notification displayer executes Velocity, the existing generic analyzer already warns admins before editing Velocity code. Note that warnings before editing documents with dangerous properties have only been introduced in XWiki 15.9, before that version, this was a known issue and the advice was simply to be careful. ### Patches This vulnerability has been patched in XWiki 15.10.16, 16.4.7, and 16.10.2 by adding a required rights analyzer that warns the admin before editing about the possibly malicious code. ### Workarounds We're not aware of any real workarounds apart from just being careful with editing documents previously edited by untrusted users as a user with script, admin or programming right.
Metadata
Created: 2025-06-13T20:45:44Z
Modified: 2025-06-13T20:45:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-j7p2-87q3-44w7/GHSA-j7p2-87q3-44w7.json
CWE IDs: ["CWE-357"]
Alternative ID: GHSA-j7p2-87q3-44w7
Finding: F416
Auto approve: 1