XWiki allows SQL injection in query endpoint of REST API with Oracle
Critical severity
GitHub Reviewed
Published
Jun 12, 2025
in
xwiki/xwiki-platform
•
Updated Jun 12, 2025
Package
Affected versions
>= 1.0, < 15.10.16
>= 16.0.0-rc-1, < 16.4.7
>= 16.5.0-rc-1, < 16.10.2
Patched versions
15.10.16
16.4.7
16.10.2
Description
Published by the National Vulnerability Database
Jun 12, 2025
Published to the GitHub Advisory Database
Jun 12, 2025
Reviewed
Jun 12, 2025
Last updated
Jun 12, 2025
Impact
It's possible to execute any SQL query in Oracle by using the function like DBMS_XMLGEN or DBMS_XMLQUERY.
The XWiki query validator does not sanitize functions that would be used in a simple
select
and Hibernate allows using any native function in an HQL query.Patches
This has been patched in 16.10.2, 16.4.7 and 15.10.16.
Workarounds
There is no known workaround, other than upgrading XWiki.
References
https://jira.xwiki.org/browse/XWIKI-22734
For more information
If you have any questions or comments about this advisory:
References