CVE ReportsThe Invisible Minefield: Weaponizing CSS in XWiki Comments Vulnerability ID:...
Vulnerability ID: CVE-2026-26000
CVSS Score: 5.3
Published: 2026-02-12
A UI redressing vulnerability (Clickjacking) in XWiki Platform allows unauthenticated attackers to hijack user clicks via CSS injection in comments. By overlaying invisible anchors on the interface, attackers can silently redirect users to malicious domains, turning a trusted wiki into a phishing launchpad.
XWiki allowed users to inject raw CSS in comments without adequate scoping. Attackers can use this to create a page-wide, invisible link (position: fixed; width: 100vw;) that sits on top of the UI. Clicking anywhere on the wiki triggers a redirect to an attacker-controlled site. The fix involves a JavaScript interceptor that prompts users before leaving the domain.
16.10.13)17.4.6)17.9.0)Implementation of Frontend Link Protection infrastructure
Added link-protection.js and trusted-domains-configuration
Refinement of link interception logic
Enhanced URL verification logic
xwiki.properties to enforce strict frontend URL checking.position: fixed.Remediation Steps:
link-protection.js is loaded in the browser developer tools.url.frontendUrlCheckEnabled=true to your xwiki.properties file.Read the full report for CVE-2026-26000 on our website for more details including interactive diagrams and full exploit analysis.