Executive Summary
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Prior to 17.4.8 and 17.10.1, an improperly protected scripting API allows any user with script right to bypass the sandboxing of the Velocity scripting API and execute, e.g., arbitrary Python scripts, allowing full access to the XWiki instance and thereby compromising the confidentiality, integrity and availability of the whole instance. Note that script right already constitutes a high level of access that we don't recommend giving to untrusted users. This vulnerability is fixed in 17.4.8 and 17.10.1.
Why It Matters
CVE-2026-33229 is rated CRITICAL severity, requiring immediate attention from security teams.
CVSS Base Score: 9.8/10
EPSS (Exploit Prediction): 0.1% probability of exploitation in the next 30 days.
Affected Technologies
Vendors: xwiki
Products: xwiki
🛡️What Defenders Should Check
Use Vulnios to continuously monitor your exposure to CVE-2026-33229 and similar vulnerabilities.
References & Sources
AI Security Advisor
Powered by Gemini
Get AI-powered security recommendations tailored to this specific threat — including risk assessment, detection guidance, MITRE ATT&CK mapping, and actionable remediation steps.
Affected Products
Sources
Protect Your Organization
Monitor CVEs, scan for vulnerabilities, and get real-time threat alerts — all in one platform.
Get instant alerts on Telegram
Join our public channel for real-time critical CVE alerts.
Follow @vulnios