16.10.1
13 years ago
18 days ago
Known vulnerabilities in the org.xwiki.commons:xwiki-commons-xml package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) such that the How to fix Cross-site Scripting (XSS)? Upgrade | [4.2-milestone-1,14.10) |
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user input sanitization when using the "restricted" mode of the HTML cleaner. Exploiting this vulnerability is possible when a privileged user with programming rights visits such a maliciously crafted comment in XWiki, the malicious JavaScript code is executed in the context of the user session. How to fix Cross-site Scripting (XSS)? Upgrade | [4.2-milestone-1,14.6-rc-1) |
Affected versions of this package are vulnerable to Improper Neutralization such that any user can edit their own profile and inject code, which is going to be executed. The same vulnerability can also be exploited in all other places where short text properties are displayed, e.g., in apps created using Apps Within Minutes that use a short text field. How to fix Improper Neutralization? Upgrade | [3.1-milestone-1,13.10.9)[14.0-rc-1,14.7-rc-1) |
Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. Any user with velocity script permissions can read arbitrary files, directory listing and perform SSRF through the XML script service. How to fix XML External Entity (XXE) Injection? Upgrade | [,12.10.10)[13.0,13.4.4)[13.5,13.8-rc-1) |