CVSS 3.1 Score 9.9 of 10 (high)


Published Dec 15, 2023
Updated: Dec 19, 2023


CVE-2023-50721 is a vulnerability that affects XWiki Platform versions 4.5-rc-1 to 14.10.15, 15.5.2, and 15.7-rc-1. It allows for the injection of XWiki syntax containing script macros, including Groovy macros, that can lead to remote code execution and impact the confidentiality, integrity, and availability of the entire XWiki instance. Any user with the ability to edit wiki pages can execute this attack by adding user interface extensions to any document. The necessary patch has been released in versions 14.10.15, 15.5.2, and 15.7RC1, but as a workaround, the patch can be manually applied to the page "XWiki.SearchAdmin". This vulnerability poses a high danger to organizations using vulnerable versions of XWiki Platform as it allows for remote code execution with low privileges required and no user interaction needed.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-50721 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options