Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
Typemaven
Namespaceorg.xwiki.platform
Namexwiki-platform-oldcore
Version13.10.11
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version14.2-rc-1
Latest_non_vulnerable_version17.10.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-mgyt-2kx1-9yfz
vulnerability_id VCID-mgyt-2kx1-9yfz
summary
XWiki Platform vulnerable to privilege escalation via properties with wiki syntax that are executed with wrong author
XWiki Platform is a generic wiki platform. Starting in version 13.10, it's possible to use the right of an existing document content author to execute a text area property. This has been patched in XWiki 14.10, 14.4.7, and 13.10.11. There are no known workarounds.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-26474
reference_id
reference_type
scores
0
value 0.02071
scoring_system epss
scoring_elements 0.83913
published_at 2026-04-07T12:55:00Z
1
value 0.02071
scoring_system epss
scoring_elements 0.84008
published_at 2026-04-26T12:55:00Z
2
value 0.02071
scoring_system epss
scoring_elements 0.84001
published_at 2026-04-24T12:55:00Z
3
value 0.02071
scoring_system epss
scoring_elements 0.83975
published_at 2026-04-21T12:55:00Z
4
value 0.02071
scoring_system epss
scoring_elements 0.83974
published_at 2026-04-18T12:55:00Z
5
value 0.02071
scoring_system epss
scoring_elements 0.83973
published_at 2026-04-16T12:55:00Z
6
value 0.02071
scoring_system epss
scoring_elements 0.83949
published_at 2026-04-13T12:55:00Z
7
value 0.02071
scoring_system epss
scoring_elements 0.83953
published_at 2026-04-12T12:55:00Z
8
value 0.02071
scoring_system epss
scoring_elements 0.83959
published_at 2026-04-11T12:55:00Z
9
value 0.02071
scoring_system epss
scoring_elements 0.83911
published_at 2026-04-04T12:55:00Z
10
value 0.02071
scoring_system epss
scoring_elements 0.83894
published_at 2026-04-02T12:55:00Z
11
value 0.02071
scoring_system epss
scoring_elements 0.83943
published_at 2026-04-09T12:55:00Z
12
value 0.02071
scoring_system epss
scoring_elements 0.83936
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-26474
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://jira.xwiki.org/browse/XWIKI-20373
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T21:21:46Z/
url https://jira.xwiki.org/browse/XWIKI-20373
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-26474
reference_id CVE-2023-26474
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-26474
4
reference_url https://github.com/advisories/GHSA-3738-p9x3-mv9r
reference_id GHSA-3738-p9x3-mv9r
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3738-p9x3-mv9r
5
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r
reference_id GHSA-3738-p9x3-mv9r
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
3
value CRITICAL
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T21:21:46Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.7
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.7
2
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
aliases CVE-2023-26474, GHSA-3738-p9x3-mv9r
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mgyt-2kx1-9yfz
1
url VCID-mpyn-zkgb-mfe8
vulnerability_id VCID-mpyn-zkgb-mfe8
summary
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can edit their own user profile can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The same vulnerability can also be exploited in other contexts where the `display` method on a document is used to display a field with wiki syntax, for example in applications created using `App Within Minutes`. This has been patched in XWiki 13.10.11, 14.4.8, 14.10.2 and 15.0RC1. There is no workaround apart from upgrading.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29523
reference_id
reference_type
scores
0
value 0.0532
scoring_system epss
scoring_elements 0.90075
published_at 2026-04-24T12:55:00Z
1
value 0.0532
scoring_system epss
scoring_elements 0.90058
published_at 2026-04-21T12:55:00Z
2
value 0.0532
scoring_system epss
scoring_elements 0.90076
published_at 2026-04-26T12:55:00Z
3
value 0.07623
scoring_system epss
scoring_elements 0.91874
published_at 2026-04-12T12:55:00Z
4
value 0.07623
scoring_system epss
scoring_elements 0.9187
published_at 2026-04-13T12:55:00Z
5
value 0.07623
scoring_system epss
scoring_elements 0.91852
published_at 2026-04-07T12:55:00Z
6
value 0.07623
scoring_system epss
scoring_elements 0.91885
published_at 2026-04-18T12:55:00Z
7
value 0.07623
scoring_system epss
scoring_elements 0.91889
published_at 2026-04-16T12:55:00Z
8
value 0.07623
scoring_system epss
scoring_elements 0.91844
published_at 2026-04-04T12:55:00Z
9
value 0.07623
scoring_system epss
scoring_elements 0.91838
published_at 2026-04-02T12:55:00Z
10
value 0.07623
scoring_system epss
scoring_elements 0.91865
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29523
1
reference_url https://extensions.xwiki.org/xwiki/bin/view/Extension/App%20Within%20Minutes%20Application
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://extensions.xwiki.org/xwiki/bin/view/Extension/App%20Within%20Minutes%20Application
2
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
3
reference_url https://github.com/xwiki/xwiki-platform/commit/0d547181389f7941e53291af940966413823f61c
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://github.com/xwiki/xwiki-platform/commit/0d547181389f7941e53291af940966413823f61c
4
reference_url https://jira.xwiki.org/browse/XWIKI-20327
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://jira.xwiki.org/browse/XWIKI-20327
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29523
reference_id CVE-2023-29523
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-29523
6
reference_url https://github.com/advisories/GHSA-x764-ff8r-9hpx
reference_id GHSA-x764-ff8r-9hpx
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x764-ff8r-9hpx
7
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x764-ff8r-9hpx
reference_id GHSA-x764-ff8r-9hpx
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
3
value CRITICAL
scoring_system generic_textual
scoring_elements
4
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x764-ff8r-9hpx
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.8
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.8
2
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.2
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.2
aliases CVE-2023-29523, GHSA-x764-ff8r-9hpx
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mpyn-zkgb-mfe8
2
url VCID-vqgg-gxsf-tqh1
vulnerability_id VCID-vqgg-gxsf-tqh1
summary
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to display or interact with any page a user cannot access through the combination of the async and display macros. A comment with either macro will be executed when viewed providing a code injection vector in the context of the running server. This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29526
reference_id
reference_type
scores
0
value 0.02234
scoring_system epss
scoring_elements 0.84481
published_at 2026-04-02T12:55:00Z
1
value 0.02234
scoring_system epss
scoring_elements 0.84529
published_at 2026-04-09T12:55:00Z
2
value 0.02234
scoring_system epss
scoring_elements 0.84523
published_at 2026-04-08T12:55:00Z
3
value 0.02234
scoring_system epss
scoring_elements 0.84502
published_at 2026-04-07T12:55:00Z
4
value 0.02234
scoring_system epss
scoring_elements 0.845
published_at 2026-04-04T12:55:00Z
5
value 0.02234
scoring_system epss
scoring_elements 0.84559
published_at 2026-04-18T12:55:00Z
6
value 0.02234
scoring_system epss
scoring_elements 0.84538
published_at 2026-04-13T12:55:00Z
7
value 0.02234
scoring_system epss
scoring_elements 0.84543
published_at 2026-04-12T12:55:00Z
8
value 0.02234
scoring_system epss
scoring_elements 0.84548
published_at 2026-04-11T12:55:00Z
9
value 0.1074
scoring_system epss
scoring_elements 0.93362
published_at 2026-04-26T12:55:00Z
10
value 0.1074
scoring_system epss
scoring_elements 0.93366
published_at 2026-04-24T12:55:00Z
11
value 0.1074
scoring_system epss
scoring_elements 0.93361
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29526
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://jira.xwiki.org/browse/XRENDERING-694
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T20:45:02Z/
url https://jira.xwiki.org/browse/XRENDERING-694
3
reference_url https://jira.xwiki.org/browse/XWIKI-20394
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T20:45:02Z/
url https://jira.xwiki.org/browse/XWIKI-20394
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29526
reference_id CVE-2023-29526
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-29526
5
reference_url https://github.com/advisories/GHSA-gpq5-7p34-vqx5
reference_id GHSA-gpq5-7p34-vqx5
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gpq5-7p34-vqx5
6
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gpq5-7p34-vqx5
reference_id GHSA-gpq5-7p34-vqx5
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
3
value CRITICAL
scoring_system generic_textual
scoring_elements
4
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T20:45:02Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gpq5-7p34-vqx5
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.8
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.8
2
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.3
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.3
aliases CVE-2023-29526, GHSA-gpq5-7p34-vqx5
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqgg-gxsf-tqh1
3
url VCID-xms6-msad-wkgm
vulnerability_id VCID-xms6-msad-wkgm
summary
org.xwiki.platform:xwiki-platform-oldcore vulnerable to data leak through deleted documents
### Impact

Rights added to a document are not taken into account for viewing it once it's deleted. Note that this vulnerability only impact deleted documents that where containing view rights: the view rights provided on a space of a deleted document are properly checked.

### Patches

The problem has been patched in XWiki 14.10 by checking the rights of current user: only admin and deleter of the document are allowed to view it.

### Workarounds

There is no workaround for this vulnerability other than upgrading.

### References

 * Jira ticket: https://jira.xwiki.org/browse/XWIKI-16285
 * Commit: https://github.com/xwiki/xwiki-platform/commit/d9e947559077e947315bf700c5703dfc7dd8a8d7

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](https://jira.xwiki.org)
* Email us at [security ML](mailto:security@xwiki.org)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29208
reference_id
reference_type
scores
0
value 0.00246
scoring_system epss
scoring_elements 0.47899
published_at 2026-04-26T12:55:00Z
1
value 0.00263
scoring_system epss
scoring_elements 0.49682
published_at 2026-04-07T12:55:00Z
2
value 0.00263
scoring_system epss
scoring_elements 0.49722
published_at 2026-04-13T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49721
published_at 2026-04-12T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.49749
published_at 2026-04-11T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49737
published_at 2026-04-08T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49703
published_at 2026-04-02T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49731
published_at 2026-04-09T12:55:00Z
8
value 0.00364
scoring_system epss
scoring_elements 0.58467
published_at 2026-04-24T12:55:00Z
9
value 0.00364
scoring_system epss
scoring_elements 0.58501
published_at 2026-04-21T12:55:00Z
10
value 0.00364
scoring_system epss
scoring_elements 0.58522
published_at 2026-04-18T12:55:00Z
11
value 0.00364
scoring_system epss
scoring_elements 0.58518
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29208
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/d9e947559077e947315bf700c5703dfc7dd8a8d7
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:08:42Z/
url https://github.com/xwiki/xwiki-platform/commit/d9e947559077e947315bf700c5703dfc7dd8a8d7
3
reference_url https://jira.xwiki.org/browse/XWIKI-16285
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:08:42Z/
url https://jira.xwiki.org/browse/XWIKI-16285
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29208
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-29208
5
reference_url https://github.com/advisories/GHSA-4f8g-fq6x-jqrr
reference_id GHSA-4f8g-fq6x-jqrr
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4f8g-fq6x-jqrr
6
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8g-fq6x-jqrr
reference_id GHSA-4f8g-fq6x-jqrr
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:08:42Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8g-fq6x-jqrr
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.7
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.7
2
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
aliases CVE-2023-29208, GHSA-4f8g-fq6x-jqrr
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xms6-msad-wkgm
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11