XWiki Platform vulnerable to SQL injection through getdeleteddocuments.vm template sort parameter
Critical severity
GitHub Reviewed
Published
Jul 24, 2025
in
xwiki/xwiki-platform
•
Updated Jul 25, 2025
Package
Affected versions
>= 9.4-rc-1, < 16.10.6
>= 17.0.0-rc-1, < 17.3.0-rc-1
Patched versions
16.10.6
17.3.0-rc-1
Description
Published to the GitHub Advisory Database
Jul 24, 2025
Reviewed
Jul 24, 2025
Published by the National Vulnerability Database
Jul 24, 2025
Last updated
Jul 25, 2025
Impact
It's possible for anyone to inject SQL using the parameter sort of the
getdeleteddocuments.vm
. It's injected as is as an ORDER BY value.One can see the result of the injection with http://127.0.0.1:8080/xwiki/rest/liveData/sources/liveTable/entries?sourceParams.template=getdeleteddocuments.vm&sort=injected (this example does not work, but it shows that an HQL query was executed with the passed value which look nothing like an order by value, without any kind of sanitation).
Patches
This has been patched in 17.3.0-rc-1, 16.10.6.
Workarounds
There is no known workaround, other than upgrading XWiki.
References
https://jira.xwiki.org/browse/XWIKI-23093
For more information
If you have any questions or comments about this advisory:
Attribution
The vulnerability was identifier by Aleksey Solovev from Positive Technologies.
References