Lookup for vulnerable packages by Package URL.
| Purl | pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@1.0 |
| Type | maven |
| Namespace | org.xwiki.platform |
| Name | xwiki-platform-oldcore |
| Version | 1.0 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 11.10.5 |
| Latest_non_vulnerable_version | 17.10.1 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-1ep7-j2b3-duat |
| vulnerability_id |
VCID-1ep7-j2b3-duat |
| summary |
XWiki has no right protection on rollback action
### Impact
The rollback action is missing a right protection: it means that a user can rollback to a previous version of the page to gain rights they don't have anymore.
This vulnerability impacts all version of XWiki since rollback action is available.
### Patches
The problem has been patched in XWiki 14.10.16, 15.5.3 and 15.8-rc-1 by ensuring that the rights are checked before performing the rollback.
### Workarounds
There's no workaround for this vulnerability, except paying attention to delete old versions of documents that could allow users to gain more rights.
### References
* JIRA ticket: https://jira.xwiki.org/browse/XWIKI-21257
* Commit: [4de72875ca49602796165412741033bfdbf1e680](https://github.com/xwiki/xwiki-platform/commit/4de72875ca49602796165412741033bfdbf1e680)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:security@xwiki.org) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-21648 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0034 |
| scoring_system |
epss |
| scoring_elements |
0.56765 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0034 |
| scoring_system |
epss |
| scoring_elements |
0.5681 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.0034 |
| scoring_system |
epss |
| scoring_elements |
0.56812 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.0034 |
| scoring_system |
epss |
| scoring_elements |
0.56782 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0034 |
| scoring_system |
epss |
| scoring_elements |
0.56803 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0034 |
| scoring_system |
epss |
| scoring_elements |
0.56825 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0034 |
| scoring_system |
epss |
| scoring_elements |
0.56818 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0034 |
| scoring_system |
epss |
| scoring_elements |
0.56813 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.0034 |
| scoring_system |
epss |
| scoring_elements |
0.56761 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.0034 |
| scoring_system |
epss |
| scoring_elements |
0.56785 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-21648 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://jira.xwiki.org/browse/XWIKI-21257 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-09T14:22:41Z/ |
|
|
| url |
https://jira.xwiki.org/browse/XWIKI-21257 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-21648, GHSA-xh35-w7wg-95v3
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1ep7-j2b3-duat |
|
| 1 |
| url |
VCID-4czm-tywp-h3er |
| vulnerability_id |
VCID-4czm-tywp-h3er |
| summary |
XWiki Platform vulnerable to privilege escalation and remote code execution via the edit action
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible for a user to execute any content with the right of an existing document's content author, provided the user have edit right on it. A crafted URL of the form ` /xwiki/bin/edit//?content=%7B%7Bgroovy%7D%7Dprintln%28%22Hello+from+ Groovy%21%22%29%7B%7B%2Fgroovy%7D%7D&xpage=view` can be used to execute arbitrary groovy code on the server. This vulnerability has been patched in XWiki versions 14.10.6 and 15.2RC1. Users are advised to update. There are no known workarounds for this issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46243 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91751 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91764 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91757 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91798 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91797 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91805 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91785 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91789 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91787 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91784 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91777 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46243 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://jira.xwiki.org/browse/XWIKI-20385 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
10 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
|
| 1 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track* |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-04T15:50:55Z/ |
|
|
| url |
https://jira.xwiki.org/browse/XWIKI-20385 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-46243, GHSA-g2qq-c5j9-5w5w
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4czm-tywp-h3er |
|
| 2 |
| url |
VCID-4fw7-4s5x-n3fv |
| vulnerability_id |
VCID-4fw7-4s5x-n3fv |
| summary |
XWiki Platform vulnerable to SQL injection through XWiki#searchDocuments API
### Impact
It's possible to execute any SQL query in Oracle by using the function like [DBMS_XMLGEN or DBMS_XMLQUERY](https://docs.oracle.com/en/database/oracle/oracle-database/19/arpls/DBMS_XMLGEN.html).
The XWiki#searchDocuments APIs are not sanitizing the query at all and even if they force a specific select, Hibernate allows using any native function in an HQL query (for example in the WHERE).
### Patches
This has been patched in 16.10.6 and 17.3.0-rc-1.
### Workarounds
There is no known workaround, other than upgrading XWiki.
### References
https://jira.xwiki.org/browse/XWIKI-22728
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:security@xwiki.org) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-54385 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.64586 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.64627 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.64615 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.64633 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.0047 |
| scoring_system |
epss |
| scoring_elements |
0.64621 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65416 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.6547 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65459 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65406 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65443 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00524 |
| scoring_system |
epss |
| scoring_elements |
0.66961 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-54385 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://jira.xwiki.org/browse/XWIKI-22728 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 1 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-07-28T18:59:18Z/ |
|
|
| url |
https://jira.xwiki.org/browse/XWIKI-22728 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-54385, GHSA-p9qm-p942-q3w5
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4fw7-4s5x-n3fv |
|
| 3 |
| url |
VCID-f872-dkzj-ufac |
| vulnerability_id |
VCID-f872-dkzj-ufac |
| summary |
XWiki allows SQL injection in query endpoint of REST API with Oracle
### Impact
It's possible to execute any SQL query in Oracle by using the function like [DBMS_XMLGEN or DBMS_XMLQUERY](https://docs.oracle.com/en/database/oracle/oracle-database/19/arpls/DBMS_XMLGEN.html).
The XWiki query validator does not sanitize functions that would be used in a simple `select` and Hibernate allows using any native function in an HQL query.
### Patches
This has been patched in 16.10.2, 16.4.7 and 15.10.16.
### Workarounds
There is no known workaround, other than upgrading XWiki.
### References
https://jira.xwiki.org/browse/XWIKI-22734
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:security@xwiki.org) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-56158 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0071 |
| scoring_system |
epss |
| scoring_elements |
0.72197 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0071 |
| scoring_system |
epss |
| scoring_elements |
0.72193 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.0071 |
| scoring_system |
epss |
| scoring_elements |
0.72217 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01603 |
| scoring_system |
epss |
| scoring_elements |
0.81753 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.01603 |
| scoring_system |
epss |
| scoring_elements |
0.81712 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.01603 |
| scoring_system |
epss |
| scoring_elements |
0.81718 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.01603 |
| scoring_system |
epss |
| scoring_elements |
0.81731 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01603 |
| scoring_system |
epss |
| scoring_elements |
0.81711 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.01603 |
| scoring_system |
epss |
| scoring_elements |
0.81707 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.01603 |
| scoring_system |
epss |
| scoring_elements |
0.8175 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-56158 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://jira.xwiki.org/browse/XWIKI-22734 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 1 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-12T15:23:16Z/ |
|
|
| url |
https://jira.xwiki.org/browse/XWIKI-22734 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-56158, GHSA-prwh-7838-xf82
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f872-dkzj-ufac |
|
| 4 |
| url |
VCID-kx6s-546m-gkdv |
| vulnerability_id |
VCID-kx6s-546m-gkdv |
| summary |
Cross-Site Request Forgery (CSRF)
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to execute a content with the right of any user via a crafted URL. A user must have `programming` privileges in order to exploit this vulnerability. This issue has been patched in XWiki 14.10.7 and 15.2RC1. Users are advised to upgrade. There are no known workarounds for for this vulnerability. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46242 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03252 |
| scoring_system |
epss |
| scoring_elements |
0.8708 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.03252 |
| scoring_system |
epss |
| scoring_elements |
0.87092 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.03252 |
| scoring_system |
epss |
| scoring_elements |
0.87098 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03252 |
| scoring_system |
epss |
| scoring_elements |
0.8714 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.03252 |
| scoring_system |
epss |
| scoring_elements |
0.87143 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.03252 |
| scoring_system |
epss |
| scoring_elements |
0.87139 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.03252 |
| scoring_system |
epss |
| scoring_elements |
0.87122 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.03252 |
| scoring_system |
epss |
| scoring_elements |
0.87127 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03252 |
| scoring_system |
epss |
| scoring_elements |
0.87133 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.03252 |
| scoring_system |
epss |
| scoring_elements |
0.87119 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.03252 |
| scoring_system |
epss |
| scoring_elements |
0.87112 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46242 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://jira.xwiki.org/browse/XWIKI-20386 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
|
| 1 |
| value |
9.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-04T16:19:57Z/ |
|
|
| url |
https://jira.xwiki.org/browse/XWIKI-20386 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-46242, GHSA-hgpw-6p4h-j6h5
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kx6s-546m-gkdv |
|
| 5 |
| url |
VCID-q5t9-725x-dkb1 |
| vulnerability_id |
VCID-q5t9-725x-dkb1 |
| summary |
Partial authorization bypass on document save in xwiki-platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. This has been patched in XWiki 13.0. Users are advised to update to resolve this issue. The only known workaround is to limit SCRIPT access. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23615 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14719 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14577 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14512 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14506 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14615 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.1467 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14707 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14747 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14688 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14599 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14793 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23615 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-23615, GHSA-f4cj-3q3h-884r
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q5t9-725x-dkb1 |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 4.5 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@1.0 |