XWiki is vulnerable to reflected cross-site scripting (RXSS) via the rev parameter that is used in the content of the content menu without escaping. If an attacker can convince a user to visit a link with a crafted parameter, this allows the attacker to execute arbitrary actions in the name of the user, including remote code (Groovy) execution in the case of a user with programming right, compromising the confidentiality, integrity and availability of the whole XWiki installation.
impact:|
Successful exploitation could lead to cross-site scripting attack.
remediation:|
This has been patched in XWiki 15.6 RC1, 15.5.1 and 14.10.14.