Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2026-23734— XWiki Platform: Path traversal via resources parameter in ssx and jsx endpoints when using leading slash

AI Predicted 6.5 Difficulty: Easy EPSS 0.04% · P12

Possible ATT&CK Techniques 1AI

T1083 · File and Directory Discovery

Affected Version Matrix 4

VendorProductVersion RangeStatus
xwikixwiki-commons< 16.10.17affected
>= 17.0.0-rc-1, < 17.4.9affected
>= 17.5.0, < 17.10.3affected
>= 18.0.0-rc-1, < 18.1.0-rc-1affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-23734

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
XWiki Platform: Path traversal via resources parameter in ssx and jsx endpoints when using leading slash
Source: NVD (National Vulnerability Database)
Vulnerability Description
XWiki Platform is a generic wiki platform. Versions prior to 18.1.0-rc-1, 17.10.3, 17.4.9, and 16.10.17 allow access to read configuration files by using URLs such as http://localhost:8080/bin/ssx/Main/WebHome?resource=/../../WEB-INF/xwiki.cfg&minify=false, leading to Path Traversal. The vulnerability is can be exploited via resources parameter the ssx and jsx endpoints by using leading slashes. This issue has been patched in 18.1.0-rc-1, 17.10.3, 17.4.9, 16.10.17.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
相对路径遍历
Source: NVD (National Vulnerability Database)
Vulnerability Title
XWiki Platform 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
XWiki Platform是XWiki开源的一套用于创建Web协作应用程序的Wiki平台。 XWiki Platform 18.1.0-rc-1之前版本、17.10.3之前版本、17.4.9之前版本和16.10.17之前版本存在安全漏洞,该漏洞源于ssx和jsx端点中resources参数处理不当,可能导致通过路径遍历读取配置文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
xwikixwiki-commons < 16.10.17 -

II. Public POCs for CVE-2026-23734

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-23734

登录查看更多情报信息。

Patches & Fixes for CVE-2026-23734 (1)

Vendor Advisories for CVE-2026-23734 (2)

IV. Related Vulnerabilities

V. Comments for CVE-2026-23734

No comments yet


Leave a comment