Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.0
Typemaven
Namespaceorg.xwiki.platform
Namexwiki-platform-oldcore
Version14.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version14.2-rc-1
Latest_non_vulnerable_version17.10.1
Affected_by_vulnerabilities
0
url VCID-cred-gs3x-1yc5
vulnerability_id VCID-cred-gs3x-1yc5
summary
XWiki Platform Improper Authorization check for inactive users
### Impact

Some resources are missing a check for inactive (not yet activated or disabled) users in XWiki, including the REST service: so a disabled user can enable themselves using a REST call. On the same way some resources handler created by extensions are not protected by default: so an inactive users could perform actions for such extensions.

This issue exists since at least version 1.1 of XWiki for instance configured with the email activation required for new users. Now it's more critical for newer versions (>= 11.3RC1) since we provided the capability to disable user without deleting them, and we encouraged using that feature.

### Patches

This issue has been patched in XWiki 14.3RC1 and XWiki 13.10.5. 

### Workarounds

There is no workaround for this other than upgrading XWiki. 

### References

 * https://jira.xwiki.org/browse/XWIKI-19559

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org)
* Email us at [security mailing-list](mailto:security@xwiki.com)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36090
reference_id
reference_type
scores
0
value 0.01329
scoring_system epss
scoring_elements 0.79904
published_at 2026-04-07T12:55:00Z
1
value 0.01329
scoring_system epss
scoring_elements 0.79895
published_at 2026-04-02T12:55:00Z
2
value 0.01329
scoring_system epss
scoring_elements 0.79916
published_at 2026-04-04T12:55:00Z
3
value 0.01329
scoring_system epss
scoring_elements 0.80002
published_at 2026-04-26T12:55:00Z
4
value 0.01329
scoring_system epss
scoring_elements 0.79996
published_at 2026-04-24T12:55:00Z
5
value 0.01329
scoring_system epss
scoring_elements 0.79968
published_at 2026-04-21T12:55:00Z
6
value 0.01329
scoring_system epss
scoring_elements 0.79965
published_at 2026-04-18T12:55:00Z
7
value 0.01329
scoring_system epss
scoring_elements 0.79937
published_at 2026-04-13T12:55:00Z
8
value 0.01329
scoring_system epss
scoring_elements 0.79944
published_at 2026-04-12T12:55:00Z
9
value 0.01329
scoring_system epss
scoring_elements 0.79961
published_at 2026-04-11T12:55:00Z
10
value 0.01329
scoring_system epss
scoring_elements 0.79941
published_at 2026-04-09T12:55:00Z
11
value 0.01329
scoring_system epss
scoring_elements 0.79933
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36090
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/e074d226d9b2b96a0a1ba4349d1b73a802842986
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:42:05Z/
url https://github.com/xwiki/xwiki-platform/commit/e074d226d9b2b96a0a1ba4349d1b73a802842986
3
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jgc8-gvcx-9vfx
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:42:05Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jgc8-gvcx-9vfx
4
reference_url https://jira.xwiki.org/browse/XWIKI-19559
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:42:05Z/
url https://jira.xwiki.org/browse/XWIKI-19559
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36090
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36090
6
reference_url https://github.com/advisories/GHSA-jgc8-gvcx-9vfx
reference_id GHSA-jgc8-gvcx-9vfx
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jgc8-gvcx-9vfx
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.3-rc-1
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.3-rc-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.3-rc-1
aliases CVE-2022-36090, GHSA-jgc8-gvcx-9vfx
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cred-gs3x-1yc5
1
url VCID-f9gd-r31y-dycc
vulnerability_id VCID-f9gd-r31y-dycc
summary
XWiki Platform Old Core vulnerable to Authentication Bypass Using the Login Action
### Impact
All rights checks that would normally prevent a user from viewing a document on a wiki can be bypassed using the login action and directly specified templates. This exposes title, content and comments of any document and properties of objects (class and property name must be known, though). This is also exploitable on [private wikis](https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Access%20Rights/#HPrivateWiki).

### Patches
This has been patched in versions 14.2 and 13.10.4 by properly checking view rights before loading documents and disallowing non-default templates in the login, registration and skin action.

### Workarounds
It would be possible to protect all templates individually by adding code to check access rights first, but due to the number of templates and the fact that some of them need to be used without view rights, this seems impractical.

### References
* https://jira.xwiki.org/browse/XWIKI-19549
* https://jira.xwiki.org/browse/XWIKI-18602

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [security mailing-list](mailto:security@xwiki.com)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36092
reference_id
reference_type
scores
0
value 0.00294
scoring_system epss
scoring_elements 0.52738
published_at 2026-04-24T12:55:00Z
1
value 0.00294
scoring_system epss
scoring_elements 0.52705
published_at 2026-04-02T12:55:00Z
2
value 0.00294
scoring_system epss
scoring_elements 0.52732
published_at 2026-04-04T12:55:00Z
3
value 0.00294
scoring_system epss
scoring_elements 0.52697
published_at 2026-04-07T12:55:00Z
4
value 0.00294
scoring_system epss
scoring_elements 0.52749
published_at 2026-04-26T12:55:00Z
5
value 0.00294
scoring_system epss
scoring_elements 0.52743
published_at 2026-04-09T12:55:00Z
6
value 0.00294
scoring_system epss
scoring_elements 0.52794
published_at 2026-04-11T12:55:00Z
7
value 0.00294
scoring_system epss
scoring_elements 0.52777
published_at 2026-04-12T12:55:00Z
8
value 0.00294
scoring_system epss
scoring_elements 0.52761
published_at 2026-04-13T12:55:00Z
9
value 0.00294
scoring_system epss
scoring_elements 0.52799
published_at 2026-04-16T12:55:00Z
10
value 0.00294
scoring_system epss
scoring_elements 0.52806
published_at 2026-04-18T12:55:00Z
11
value 0.00294
scoring_system epss
scoring_elements 0.5279
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36092
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:44Z/
url https://github.com/xwiki/xwiki-platform/commit/71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb
3
reference_url https://github.com/xwiki/xwiki-platform/commit/9b7057d57a941592d763992d4299456300918208
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:44Z/
url https://github.com/xwiki/xwiki-platform/commit/9b7057d57a941592d763992d4299456300918208
4
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8h89-34w2-jpfm
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:44Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8h89-34w2-jpfm
5
reference_url https://jira.xwiki.org/browse/XWIKI-18602
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:44Z/
url https://jira.xwiki.org/browse/XWIKI-18602
6
reference_url https://jira.xwiki.org/browse/XWIKI-19549
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:44Z/
url https://jira.xwiki.org/browse/XWIKI-19549
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36092
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36092
8
reference_url https://github.com/advisories/GHSA-8h89-34w2-jpfm
reference_id GHSA-8h89-34w2-jpfm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8h89-34w2-jpfm
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.2
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4mj5-repk-zyg2
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.2
aliases CVE-2022-36092, GHSA-8h89-34w2-jpfm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f9gd-r31y-dycc
2
url VCID-mgyt-2kx1-9yfz
vulnerability_id VCID-mgyt-2kx1-9yfz
summary
XWiki Platform vulnerable to privilege escalation via properties with wiki syntax that are executed with wrong author
XWiki Platform is a generic wiki platform. Starting in version 13.10, it's possible to use the right of an existing document content author to execute a text area property. This has been patched in XWiki 14.10, 14.4.7, and 13.10.11. There are no known workarounds.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-26474
reference_id
reference_type
scores
0
value 0.02071
scoring_system epss
scoring_elements 0.83913
published_at 2026-04-07T12:55:00Z
1
value 0.02071
scoring_system epss
scoring_elements 0.84008
published_at 2026-04-26T12:55:00Z
2
value 0.02071
scoring_system epss
scoring_elements 0.84001
published_at 2026-04-24T12:55:00Z
3
value 0.02071
scoring_system epss
scoring_elements 0.83975
published_at 2026-04-21T12:55:00Z
4
value 0.02071
scoring_system epss
scoring_elements 0.83974
published_at 2026-04-18T12:55:00Z
5
value 0.02071
scoring_system epss
scoring_elements 0.83973
published_at 2026-04-16T12:55:00Z
6
value 0.02071
scoring_system epss
scoring_elements 0.83949
published_at 2026-04-13T12:55:00Z
7
value 0.02071
scoring_system epss
scoring_elements 0.83953
published_at 2026-04-12T12:55:00Z
8
value 0.02071
scoring_system epss
scoring_elements 0.83959
published_at 2026-04-11T12:55:00Z
9
value 0.02071
scoring_system epss
scoring_elements 0.83911
published_at 2026-04-04T12:55:00Z
10
value 0.02071
scoring_system epss
scoring_elements 0.83894
published_at 2026-04-02T12:55:00Z
11
value 0.02071
scoring_system epss
scoring_elements 0.83943
published_at 2026-04-09T12:55:00Z
12
value 0.02071
scoring_system epss
scoring_elements 0.83936
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-26474
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://jira.xwiki.org/browse/XWIKI-20373
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T21:21:46Z/
url https://jira.xwiki.org/browse/XWIKI-20373
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-26474
reference_id CVE-2023-26474
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-26474
4
reference_url https://github.com/advisories/GHSA-3738-p9x3-mv9r
reference_id GHSA-3738-p9x3-mv9r
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3738-p9x3-mv9r
5
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r
reference_id GHSA-3738-p9x3-mv9r
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
3
value CRITICAL
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T21:21:46Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.7
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.7
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
aliases CVE-2023-26474, GHSA-3738-p9x3-mv9r
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mgyt-2kx1-9yfz
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.0