Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.xwiki.platform/xwiki-platform-oldcore
  4. ›
  5. CVE-2024-56158

CVE-2024-56158: XWiki allows SQL injection in query endpoint of REST API with Oracle

June 12, 2025 (updated November 10, 2025)

It’s possible to execute any SQL query in Oracle by using the function like DBMS_XMLGEN or DBMS_XMLQUERY.

The XWiki query validator does not sanitize functions that would be used in a simple select and Hibernate allows using any native function in an HQL query.

References

  • github.com/advisories/GHSA-prwh-7838-xf82
  • github.com/xwiki/xwiki-platform
  • github.com/xwiki/xwiki-platform/security/advisories/GHSA-prwh-7838-xf82
  • jira.xwiki.org/browse/XWIKI-22734
  • nvd.nist.gov/vuln/detail/CVE-2024-56158

Code Behaviors & Features

Detect and mitigate CVE-2024-56158 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.0 before 15.10.16, all versions starting from 16.0.0-rc-1 before 16.4.7, all versions starting from 16.5.0-rc-1 before 16.10.2

Fixed versions

  • 15.10.16
  • 16.4.7
  • 16.10.2

Solution

Upgrade to versions 15.10.16, 16.10.2, 16.4.7 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Source file

maven/org.xwiki.platform/xwiki-platform-oldcore/CVE-2024-56158.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 28 Nov 2025 13:28:29 +0000.