Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.5
Typemaven
Namespaceorg.xwiki.platform
Namexwiki-platform-oldcore
Version14.5
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version14.6-rc-1
Latest_non_vulnerable_version17.10.1
Affected_by_vulnerabilities
0
url VCID-gxbk-2r83-kbav
vulnerability_id VCID-gxbk-2r83-kbav
summary
org.xwiki.platform:xwiki-platform-oldcore Open Redirect vulnerability
### Impact

It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`.

### Patches
The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.

### Workarounds
The only way to workaround the bug is by providing a patched jar of xwiki-platform-oldcore containing the following changes: https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e#diff-c445f288d5d63424f56ef13f65514ab4e174a72e979b53b88197c2b7def267cf.

### References

 * Jira ticket of the reported vulnerability: https://jira.xwiki.org/browse/XWIKI-19994
 * Jira ticket of the original mechanism put in place to prevent open redirect: https://jira.xwiki.org/browse/XWIKI-10309
 * Original advisory about open redirect: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](https://jira.xwiki.org)
* Email us at [Security ML](mailto:security@xwiki.org)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29204
reference_id
reference_type
scores
0
value 0.01021
scoring_system epss
scoring_elements 0.77325
published_at 2026-04-29T12:55:00Z
1
value 0.01116
scoring_system epss
scoring_elements 0.7823
published_at 2026-04-16T12:55:00Z
2
value 0.01116
scoring_system epss
scoring_elements 0.78261
published_at 2026-04-26T12:55:00Z
3
value 0.01116
scoring_system epss
scoring_elements 0.78255
published_at 2026-04-24T12:55:00Z
4
value 0.01116
scoring_system epss
scoring_elements 0.78223
published_at 2026-04-21T12:55:00Z
5
value 0.01116
scoring_system epss
scoring_elements 0.78228
published_at 2026-04-18T12:55:00Z
6
value 0.09834
scoring_system epss
scoring_elements 0.92958
published_at 2026-04-02T12:55:00Z
7
value 0.09834
scoring_system epss
scoring_elements 0.92962
published_at 2026-04-07T12:55:00Z
8
value 0.09834
scoring_system epss
scoring_elements 0.92969
published_at 2026-04-08T12:55:00Z
9
value 0.09834
scoring_system epss
scoring_elements 0.92974
published_at 2026-04-09T12:55:00Z
10
value 0.09834
scoring_system epss
scoring_elements 0.92978
published_at 2026-04-13T12:55:00Z
11
value 0.09834
scoring_system epss
scoring_elements 0.92976
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29204
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e#diff-c445f288d5d63424f56ef13f65514ab4e174a72e979b53b88197c2b7def267cf
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:06:40Z/
url https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e#diff-c445f288d5d63424f56ef13f65514ab4e174a72e979b53b88197c2b7def267cf
3
reference_url https://jira.xwiki.org/browse/XWIKI-10309
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:06:40Z/
url https://jira.xwiki.org/browse/XWIKI-10309
4
reference_url https://jira.xwiki.org/browse/XWIKI-19994
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:06:40Z/
url https://jira.xwiki.org/browse/XWIKI-19994
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29204
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-29204
6
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv
reference_id GHSA-jp55-vvmf-63mv
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv
7
reference_url https://github.com/advisories/GHSA-xwph-x6xj-wggv
reference_id GHSA-xwph-x6xj-wggv
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-xwph-x6xj-wggv
8
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xwph-x6xj-wggv
reference_id GHSA-xwph-x6xj-wggv
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:06:40Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xwph-x6xj-wggv
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.8-rc-1
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.8-rc-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.8-rc-1
aliases CVE-2023-29204, GHSA-xwph-x6xj-wggv
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gxbk-2r83-kbav
1
url VCID-ka4y-na7f-5kcc
vulnerability_id VCID-ka4y-na7f-5kcc
summary
org.xwiki.platform:xwiki-platform-oldcore makes Incorrect Use of Privileged APIs with DocumentAuthors
The Document script API returns directly a DocumentAuthors allowing to set any authors to the document, which in consequence can allow subsequent executions of scripts since this author is used for checking rights.
Example of such attack: ``` {{velocity}} $doc.setContent('{{velocity}}$xcontext.context.authorReference{{/velocity}}') $doc.authors.setContentAuthor('xwiki:XWiki.superadmin') $doc.getRenderedContent() {{/velocity}}```
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29507
reference_id
reference_type
scores
0
value 0.0085
scoring_system epss
scoring_elements 0.74832
published_at 2026-04-07T12:55:00Z
1
value 0.0085
scoring_system epss
scoring_elements 0.74881
published_at 2026-04-12T12:55:00Z
2
value 0.0085
scoring_system epss
scoring_elements 0.74902
published_at 2026-04-11T12:55:00Z
3
value 0.0085
scoring_system epss
scoring_elements 0.74878
published_at 2026-04-09T12:55:00Z
4
value 0.0085
scoring_system epss
scoring_elements 0.7483
published_at 2026-04-02T12:55:00Z
5
value 0.0085
scoring_system epss
scoring_elements 0.74865
published_at 2026-04-08T12:55:00Z
6
value 0.0085
scoring_system epss
scoring_elements 0.74859
published_at 2026-04-04T12:55:00Z
7
value 0.0085
scoring_system epss
scoring_elements 0.74908
published_at 2026-04-16T12:55:00Z
8
value 0.0085
scoring_system epss
scoring_elements 0.74871
published_at 2026-04-13T12:55:00Z
9
value 0.03251
scoring_system epss
scoring_elements 0.87142
published_at 2026-04-18T12:55:00Z
10
value 0.09937
scoring_system epss
scoring_elements 0.93048
published_at 2026-04-29T12:55:00Z
11
value 0.09937
scoring_system epss
scoring_elements 0.93052
published_at 2026-04-26T12:55:00Z
12
value 0.09937
scoring_system epss
scoring_elements 0.93045
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29507
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/905cdd7c421dbf8c565557cdc773ab1aa9028f83
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-06T16:59:40Z/
url https://github.com/xwiki/xwiki-platform/commit/905cdd7c421dbf8c565557cdc773ab1aa9028f83
3
reference_url https://jira.xwiki.org/browse/XWIKI-20380
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-06T16:59:40Z/
url https://jira.xwiki.org/browse/XWIKI-20380
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29507
reference_id CVE-2023-29507
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-29507
5
reference_url https://github.com/advisories/GHSA-pwfv-3cvg-9m4c
reference_id GHSA-pwfv-3cvg-9m4c
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pwfv-3cvg-9m4c
6
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-pwfv-3cvg-9m4c
reference_id GHSA-pwfv-3cvg-9m4c
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-06T16:59:40Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-pwfv-3cvg-9m4c
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
aliases CVE-2023-29507, GHSA-pwfv-3cvg-9m4c
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ka4y-na7f-5kcc
2
url VCID-mgyt-2kx1-9yfz
vulnerability_id VCID-mgyt-2kx1-9yfz
summary
XWiki Platform vulnerable to privilege escalation via properties with wiki syntax that are executed with wrong author
XWiki Platform is a generic wiki platform. Starting in version 13.10, it's possible to use the right of an existing document content author to execute a text area property. This has been patched in XWiki 14.10, 14.4.7, and 13.10.11. There are no known workarounds.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-26474
reference_id
reference_type
scores
0
value 0.02071
scoring_system epss
scoring_elements 0.83913
published_at 2026-04-07T12:55:00Z
1
value 0.02071
scoring_system epss
scoring_elements 0.84014
published_at 2026-04-29T12:55:00Z
2
value 0.02071
scoring_system epss
scoring_elements 0.84008
published_at 2026-04-26T12:55:00Z
3
value 0.02071
scoring_system epss
scoring_elements 0.84001
published_at 2026-04-24T12:55:00Z
4
value 0.02071
scoring_system epss
scoring_elements 0.83975
published_at 2026-04-21T12:55:00Z
5
value 0.02071
scoring_system epss
scoring_elements 0.83974
published_at 2026-04-18T12:55:00Z
6
value 0.02071
scoring_system epss
scoring_elements 0.83973
published_at 2026-04-16T12:55:00Z
7
value 0.02071
scoring_system epss
scoring_elements 0.83949
published_at 2026-04-13T12:55:00Z
8
value 0.02071
scoring_system epss
scoring_elements 0.83953
published_at 2026-04-12T12:55:00Z
9
value 0.02071
scoring_system epss
scoring_elements 0.83911
published_at 2026-04-04T12:55:00Z
10
value 0.02071
scoring_system epss
scoring_elements 0.83894
published_at 2026-04-02T12:55:00Z
11
value 0.02071
scoring_system epss
scoring_elements 0.83959
published_at 2026-04-11T12:55:00Z
12
value 0.02071
scoring_system epss
scoring_elements 0.83943
published_at 2026-04-09T12:55:00Z
13
value 0.02071
scoring_system epss
scoring_elements 0.83936
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-26474
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://jira.xwiki.org/browse/XWIKI-20373
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T21:21:46Z/
url https://jira.xwiki.org/browse/XWIKI-20373
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-26474
reference_id CVE-2023-26474
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-26474
4
reference_url https://github.com/advisories/GHSA-3738-p9x3-mv9r
reference_id GHSA-3738-p9x3-mv9r
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3738-p9x3-mv9r
5
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r
reference_id GHSA-3738-p9x3-mv9r
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
3
value CRITICAL
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T21:21:46Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
aliases CVE-2023-26474, GHSA-3738-p9x3-mv9r
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mgyt-2kx1-9yfz
3
url VCID-mpyn-zkgb-mfe8
vulnerability_id VCID-mpyn-zkgb-mfe8
summary
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can edit their own user profile can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The same vulnerability can also be exploited in other contexts where the `display` method on a document is used to display a field with wiki syntax, for example in applications created using `App Within Minutes`. This has been patched in XWiki 13.10.11, 14.4.8, 14.10.2 and 15.0RC1. There is no workaround apart from upgrading.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29523
reference_id
reference_type
scores
0
value 0.0532
scoring_system epss
scoring_elements 0.90075
published_at 2026-04-24T12:55:00Z
1
value 0.0532
scoring_system epss
scoring_elements 0.90058
published_at 2026-04-21T12:55:00Z
2
value 0.0532
scoring_system epss
scoring_elements 0.90076
published_at 2026-04-26T12:55:00Z
3
value 0.07623
scoring_system epss
scoring_elements 0.91852
published_at 2026-04-07T12:55:00Z
4
value 0.07623
scoring_system epss
scoring_elements 0.91865
published_at 2026-04-08T12:55:00Z
5
value 0.07623
scoring_system epss
scoring_elements 0.91838
published_at 2026-04-02T12:55:00Z
6
value 0.07623
scoring_system epss
scoring_elements 0.91885
published_at 2026-04-18T12:55:00Z
7
value 0.07623
scoring_system epss
scoring_elements 0.91889
published_at 2026-04-16T12:55:00Z
8
value 0.07623
scoring_system epss
scoring_elements 0.91874
published_at 2026-04-12T12:55:00Z
9
value 0.07623
scoring_system epss
scoring_elements 0.91844
published_at 2026-04-04T12:55:00Z
10
value 0.07623
scoring_system epss
scoring_elements 0.9187
published_at 2026-04-13T12:55:00Z
11
value 0.1064
scoring_system epss
scoring_elements 0.93327
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29523
1
reference_url https://extensions.xwiki.org/xwiki/bin/view/Extension/App%20Within%20Minutes%20Application
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://extensions.xwiki.org/xwiki/bin/view/Extension/App%20Within%20Minutes%20Application
2
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
3
reference_url https://github.com/xwiki/xwiki-platform/commit/0d547181389f7941e53291af940966413823f61c
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://github.com/xwiki/xwiki-platform/commit/0d547181389f7941e53291af940966413823f61c
4
reference_url https://jira.xwiki.org/browse/XWIKI-20327
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://jira.xwiki.org/browse/XWIKI-20327
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29523
reference_id CVE-2023-29523
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-29523
6
reference_url https://github.com/advisories/GHSA-x764-ff8r-9hpx
reference_id GHSA-x764-ff8r-9hpx
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x764-ff8r-9hpx
7
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x764-ff8r-9hpx
reference_id GHSA-x764-ff8r-9hpx
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
3
value CRITICAL
scoring_system generic_textual
scoring_elements
4
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x764-ff8r-9hpx
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.2
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.2
aliases CVE-2023-29523, GHSA-x764-ff8r-9hpx
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mpyn-zkgb-mfe8
4
url VCID-vqgg-gxsf-tqh1
vulnerability_id VCID-vqgg-gxsf-tqh1
summary
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to display or interact with any page a user cannot access through the combination of the async and display macros. A comment with either macro will be executed when viewed providing a code injection vector in the context of the running server. This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29526
reference_id
reference_type
scores
0
value 0.02234
scoring_system epss
scoring_elements 0.84502
published_at 2026-04-07T12:55:00Z
1
value 0.02234
scoring_system epss
scoring_elements 0.84548
published_at 2026-04-11T12:55:00Z
2
value 0.02234
scoring_system epss
scoring_elements 0.84529
published_at 2026-04-09T12:55:00Z
3
value 0.02234
scoring_system epss
scoring_elements 0.84523
published_at 2026-04-08T12:55:00Z
4
value 0.02234
scoring_system epss
scoring_elements 0.84481
published_at 2026-04-02T12:55:00Z
5
value 0.02234
scoring_system epss
scoring_elements 0.845
published_at 2026-04-04T12:55:00Z
6
value 0.02234
scoring_system epss
scoring_elements 0.84559
published_at 2026-04-18T12:55:00Z
7
value 0.02234
scoring_system epss
scoring_elements 0.84538
published_at 2026-04-13T12:55:00Z
8
value 0.02234
scoring_system epss
scoring_elements 0.84543
published_at 2026-04-12T12:55:00Z
9
value 0.1074
scoring_system epss
scoring_elements 0.93362
published_at 2026-04-26T12:55:00Z
10
value 0.1074
scoring_system epss
scoring_elements 0.93366
published_at 2026-04-24T12:55:00Z
11
value 0.1074
scoring_system epss
scoring_elements 0.93361
published_at 2026-04-21T12:55:00Z
12
value 0.22506
scoring_system epss
scoring_elements 0.95862
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29526
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://jira.xwiki.org/browse/XRENDERING-694
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T20:45:02Z/
url https://jira.xwiki.org/browse/XRENDERING-694
3
reference_url https://jira.xwiki.org/browse/XWIKI-20394
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T20:45:02Z/
url https://jira.xwiki.org/browse/XWIKI-20394
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29526
reference_id CVE-2023-29526
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-29526
5
reference_url https://github.com/advisories/GHSA-gpq5-7p34-vqx5
reference_id GHSA-gpq5-7p34-vqx5
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gpq5-7p34-vqx5
6
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gpq5-7p34-vqx5
reference_id GHSA-gpq5-7p34-vqx5
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
3
value CRITICAL
scoring_system generic_textual
scoring_elements
4
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T20:45:02Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gpq5-7p34-vqx5
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.3
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.3
aliases CVE-2023-29526, GHSA-gpq5-7p34-vqx5
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqgg-gxsf-tqh1
5
url VCID-xms6-msad-wkgm
vulnerability_id VCID-xms6-msad-wkgm
summary
org.xwiki.platform:xwiki-platform-oldcore vulnerable to data leak through deleted documents
### Impact

Rights added to a document are not taken into account for viewing it once it's deleted. Note that this vulnerability only impact deleted documents that where containing view rights: the view rights provided on a space of a deleted document are properly checked.

### Patches

The problem has been patched in XWiki 14.10 by checking the rights of current user: only admin and deleter of the document are allowed to view it.

### Workarounds

There is no workaround for this vulnerability other than upgrading.

### References

 * Jira ticket: https://jira.xwiki.org/browse/XWIKI-16285
 * Commit: https://github.com/xwiki/xwiki-platform/commit/d9e947559077e947315bf700c5703dfc7dd8a8d7

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](https://jira.xwiki.org)
* Email us at [security ML](mailto:security@xwiki.org)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29208
reference_id
reference_type
scores
0
value 0.00246
scoring_system epss
scoring_elements 0.47846
published_at 2026-04-29T12:55:00Z
1
value 0.00246
scoring_system epss
scoring_elements 0.47899
published_at 2026-04-26T12:55:00Z
2
value 0.00263
scoring_system epss
scoring_elements 0.49731
published_at 2026-04-09T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49722
published_at 2026-04-13T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.49721
published_at 2026-04-12T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49749
published_at 2026-04-11T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49703
published_at 2026-04-02T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49737
published_at 2026-04-08T12:55:00Z
8
value 0.00263
scoring_system epss
scoring_elements 0.49682
published_at 2026-04-07T12:55:00Z
9
value 0.00364
scoring_system epss
scoring_elements 0.58467
published_at 2026-04-24T12:55:00Z
10
value 0.00364
scoring_system epss
scoring_elements 0.58501
published_at 2026-04-21T12:55:00Z
11
value 0.00364
scoring_system epss
scoring_elements 0.58522
published_at 2026-04-18T12:55:00Z
12
value 0.00364
scoring_system epss
scoring_elements 0.58518
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29208
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/d9e947559077e947315bf700c5703dfc7dd8a8d7
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:08:42Z/
url https://github.com/xwiki/xwiki-platform/commit/d9e947559077e947315bf700c5703dfc7dd8a8d7
3
reference_url https://jira.xwiki.org/browse/XWIKI-16285
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:08:42Z/
url https://jira.xwiki.org/browse/XWIKI-16285
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29208
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-29208
5
reference_url https://github.com/advisories/GHSA-4f8g-fq6x-jqrr
reference_id GHSA-4f8g-fq6x-jqrr
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4f8g-fq6x-jqrr
6
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8g-fq6x-jqrr
reference_id GHSA-4f8g-fq6x-jqrr
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:08:42Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8g-fq6x-jqrr
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
aliases CVE-2023-29208, GHSA-4f8g-fq6x-jqrr
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xms6-msad-wkgm
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.5