16.10.1
13 years ago
17 days ago
Known vulnerabilities in the org.xwiki.commons:xwiki-commons-xml package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') due to allowing an attacker without Note: The attacker would need to ensure that the edit form looks plausible, though, which can be non-trivial as without script right the attacker cannot display the regular content of the document. How to fix Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')? Upgrade | [14.6-rc-1,14.10.6)[15.0-rc-1,15.2-rc-1) |
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization via invalid data attributes. Note: This vulnerability does not affect restricted cleaning in HTMLCleaner as there attributes are cleaned and thus characters like How to fix Cross-site Scripting (XSS)? Upgrade | [14.6-rc-1,14.10.4) |
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) such that the How to fix Cross-site Scripting (XSS)? Upgrade | [4.2-milestone-1,14.10) |
Affected versions of this package are vulnerable to Improper Neutralization such that any user can edit their own profile and inject code, which is going to be executed. The same vulnerability can also be exploited in all other places where short text properties are displayed, e.g., in apps created using Apps Within Minutes that use a short text field. How to fix Improper Neutralization? Upgrade | [3.1-milestone-1,13.10.9)[14.0-rc-1,14.7-rc-1) |