Relative Path Traversal in XWiki platform - CVE-2022-23620

 

Relative Path Traversal in XWiki platform - CVE-2022-23620

Published: February 9, 2022 / Updated: May 5, 2026


Vulnerability identifier: #VU130030
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-23620
CWE-ID: CWE-23
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: XWiki
Affected software:
XWiki platform

Detailed vulnerability description

The vulnerability allows a remote user to modify files outside the intended export directory and cause a denial of service.

The vulnerability exists due to relative path traversal in AbstractSxExportURLFactoryActionHandler#processSx when serializing an SSX or JSX document reference to the filesystem during HTML export. A remote privileged user can create and use an SSX or JSX reference containing "../" to modify files outside the intended export directory and cause a denial of service.

User interaction is required to trigger the export process.


How to mitigate CVE-2022-23620

Install security update from vendor's website.

Sources