Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.0-rc-1
Typemaven
Namespaceorg.xwiki.platform
Namexwiki-platform-oldcore
Version14.0-rc-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version14.2-rc-1
Latest_non_vulnerable_version17.10.1
Affected_by_vulnerabilities
0
url VCID-dnqk-983h-u3et
vulnerability_id VCID-dnqk-983h-u3et
summary
XWiki.WebHome vulnerable to Improper Privilege Management in XWiki resolving groups
### Impact

It's possible to exploit a bug in XWikiRights resolution of groups to obtain privilege escalation. 

More specifically, editing a right with the object editor leads to adding a supplementary empty value to groups which is then resolved as a reference to XWiki.WebHome page. Adding an XWikiGroup xobject to that page then transforms it to a group, any user put in that group would then obtain the privileges related to the edited right.

Note that this security issue is normally mitigated by the fact that XWiki.WebHome (and XWiki space in general) should be protected by default for edit rights. 

### Patches

The problem has been patched in XWiki 13.10.4 and 14.2RC1 to not consider anymore empty values in XWikiRights. 

### Workarounds

It's possible to workaround the problem by setting appropriate rights on XWiki.WebHome page to prevent users to edit it. 

### References

* https://jira.xwiki.org/browse/XWIKI-18386
* https://jira.xwiki.org/browse/XWIKI-15776

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org)
* Email us at [Security Mailing List](mailto:security@xwiki.org)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31166
reference_id
reference_type
scores
0
value 0.01997
scoring_system epss
scoring_elements 0.83592
published_at 2026-04-02T12:55:00Z
1
value 0.01997
scoring_system epss
scoring_elements 0.83608
published_at 2026-04-07T12:55:00Z
2
value 0.01997
scoring_system epss
scoring_elements 0.83606
published_at 2026-04-04T12:55:00Z
3
value 0.01997
scoring_system epss
scoring_elements 0.83713
published_at 2026-04-26T12:55:00Z
4
value 0.01997
scoring_system epss
scoring_elements 0.83705
published_at 2026-04-24T12:55:00Z
5
value 0.01997
scoring_system epss
scoring_elements 0.83681
published_at 2026-04-21T12:55:00Z
6
value 0.01997
scoring_system epss
scoring_elements 0.8368
published_at 2026-04-16T12:55:00Z
7
value 0.01997
scoring_system epss
scoring_elements 0.83645
published_at 2026-04-13T12:55:00Z
8
value 0.01997
scoring_system epss
scoring_elements 0.83649
published_at 2026-04-12T12:55:00Z
9
value 0.01997
scoring_system epss
scoring_elements 0.83657
published_at 2026-04-11T12:55:00Z
10
value 0.01997
scoring_system epss
scoring_elements 0.8364
published_at 2026-04-09T12:55:00Z
11
value 0.01997
scoring_system epss
scoring_elements 0.83632
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31166
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/pull/1800
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:42:19Z/
url https://github.com/xwiki/xwiki-platform/pull/1800
3
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g4h6-qp44-wqvx
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:42:19Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g4h6-qp44-wqvx
4
reference_url https://jira.xwiki.org/browse/XWIKI-15776
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:42:19Z/
url https://jira.xwiki.org/browse/XWIKI-15776
5
reference_url https://jira.xwiki.org/browse/XWIKI-18386
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:42:19Z/
url https://jira.xwiki.org/browse/XWIKI-18386
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-31166
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-31166
7
reference_url https://github.com/advisories/GHSA-g4h6-qp44-wqvx
reference_id GHSA-g4h6-qp44-wqvx
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g4h6-qp44-wqvx
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.2-rc-1
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.2-rc-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.2-rc-1
aliases CVE-2022-31166, GHSA-g4h6-qp44-wqvx
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dnqk-983h-u3et
1
url VCID-gxbk-2r83-kbav
vulnerability_id VCID-gxbk-2r83-kbav
summary
org.xwiki.platform:xwiki-platform-oldcore Open Redirect vulnerability
### Impact

It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`.

### Patches
The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.

### Workarounds
The only way to workaround the bug is by providing a patched jar of xwiki-platform-oldcore containing the following changes: https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e#diff-c445f288d5d63424f56ef13f65514ab4e174a72e979b53b88197c2b7def267cf.

### References

 * Jira ticket of the reported vulnerability: https://jira.xwiki.org/browse/XWIKI-19994
 * Jira ticket of the original mechanism put in place to prevent open redirect: https://jira.xwiki.org/browse/XWIKI-10309
 * Original advisory about open redirect: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](https://jira.xwiki.org)
* Email us at [Security ML](mailto:security@xwiki.org)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29204
reference_id
reference_type
scores
0
value 0.01116
scoring_system epss
scoring_elements 0.78261
published_at 2026-04-26T12:55:00Z
1
value 0.01116
scoring_system epss
scoring_elements 0.78255
published_at 2026-04-24T12:55:00Z
2
value 0.01116
scoring_system epss
scoring_elements 0.78223
published_at 2026-04-21T12:55:00Z
3
value 0.01116
scoring_system epss
scoring_elements 0.78228
published_at 2026-04-18T12:55:00Z
4
value 0.01116
scoring_system epss
scoring_elements 0.7823
published_at 2026-04-16T12:55:00Z
5
value 0.09834
scoring_system epss
scoring_elements 0.92958
published_at 2026-04-02T12:55:00Z
6
value 0.09834
scoring_system epss
scoring_elements 0.92962
published_at 2026-04-07T12:55:00Z
7
value 0.09834
scoring_system epss
scoring_elements 0.92976
published_at 2026-04-12T12:55:00Z
8
value 0.09834
scoring_system epss
scoring_elements 0.92978
published_at 2026-04-13T12:55:00Z
9
value 0.09834
scoring_system epss
scoring_elements 0.92974
published_at 2026-04-09T12:55:00Z
10
value 0.09834
scoring_system epss
scoring_elements 0.92969
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29204
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e#diff-c445f288d5d63424f56ef13f65514ab4e174a72e979b53b88197c2b7def267cf
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:06:40Z/
url https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e#diff-c445f288d5d63424f56ef13f65514ab4e174a72e979b53b88197c2b7def267cf
3
reference_url https://jira.xwiki.org/browse/XWIKI-10309
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:06:40Z/
url https://jira.xwiki.org/browse/XWIKI-10309
4
reference_url https://jira.xwiki.org/browse/XWIKI-19994
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:06:40Z/
url https://jira.xwiki.org/browse/XWIKI-19994
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29204
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-29204
6
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv
reference_id GHSA-jp55-vvmf-63mv
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv
7
reference_url https://github.com/advisories/GHSA-xwph-x6xj-wggv
reference_id GHSA-xwph-x6xj-wggv
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-xwph-x6xj-wggv
8
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xwph-x6xj-wggv
reference_id GHSA-xwph-x6xj-wggv
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:06:40Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xwph-x6xj-wggv
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.4
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.4
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.8-rc-1
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.8-rc-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.8-rc-1
aliases CVE-2023-29204, GHSA-xwph-x6xj-wggv
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gxbk-2r83-kbav
2
url VCID-mpyn-zkgb-mfe8
vulnerability_id VCID-mpyn-zkgb-mfe8
summary
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can edit their own user profile can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The same vulnerability can also be exploited in other contexts where the `display` method on a document is used to display a field with wiki syntax, for example in applications created using `App Within Minutes`. This has been patched in XWiki 13.10.11, 14.4.8, 14.10.2 and 15.0RC1. There is no workaround apart from upgrading.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29523
reference_id
reference_type
scores
0
value 0.0532
scoring_system epss
scoring_elements 0.90075
published_at 2026-04-24T12:55:00Z
1
value 0.0532
scoring_system epss
scoring_elements 0.90058
published_at 2026-04-21T12:55:00Z
2
value 0.0532
scoring_system epss
scoring_elements 0.90076
published_at 2026-04-26T12:55:00Z
3
value 0.07623
scoring_system epss
scoring_elements 0.91874
published_at 2026-04-12T12:55:00Z
4
value 0.07623
scoring_system epss
scoring_elements 0.9187
published_at 2026-04-13T12:55:00Z
5
value 0.07623
scoring_system epss
scoring_elements 0.91852
published_at 2026-04-07T12:55:00Z
6
value 0.07623
scoring_system epss
scoring_elements 0.91885
published_at 2026-04-18T12:55:00Z
7
value 0.07623
scoring_system epss
scoring_elements 0.91889
published_at 2026-04-16T12:55:00Z
8
value 0.07623
scoring_system epss
scoring_elements 0.91844
published_at 2026-04-04T12:55:00Z
9
value 0.07623
scoring_system epss
scoring_elements 0.91838
published_at 2026-04-02T12:55:00Z
10
value 0.07623
scoring_system epss
scoring_elements 0.91865
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29523
1
reference_url https://extensions.xwiki.org/xwiki/bin/view/Extension/App%20Within%20Minutes%20Application
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://extensions.xwiki.org/xwiki/bin/view/Extension/App%20Within%20Minutes%20Application
2
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
3
reference_url https://github.com/xwiki/xwiki-platform/commit/0d547181389f7941e53291af940966413823f61c
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://github.com/xwiki/xwiki-platform/commit/0d547181389f7941e53291af940966413823f61c
4
reference_url https://jira.xwiki.org/browse/XWIKI-20327
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://jira.xwiki.org/browse/XWIKI-20327
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29523
reference_id CVE-2023-29523
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-29523
6
reference_url https://github.com/advisories/GHSA-x764-ff8r-9hpx
reference_id GHSA-x764-ff8r-9hpx
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x764-ff8r-9hpx
7
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x764-ff8r-9hpx
reference_id GHSA-x764-ff8r-9hpx
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
3
value CRITICAL
scoring_system generic_textual
scoring_elements
4
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x764-ff8r-9hpx
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.8
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.8
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.2
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.2
aliases CVE-2023-29523, GHSA-x764-ff8r-9hpx
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mpyn-zkgb-mfe8
3
url VCID-vqgg-gxsf-tqh1
vulnerability_id VCID-vqgg-gxsf-tqh1
summary
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to display or interact with any page a user cannot access through the combination of the async and display macros. A comment with either macro will be executed when viewed providing a code injection vector in the context of the running server. This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29526
reference_id
reference_type
scores
0
value 0.02234
scoring_system epss
scoring_elements 0.84481
published_at 2026-04-02T12:55:00Z
1
value 0.02234
scoring_system epss
scoring_elements 0.84529
published_at 2026-04-09T12:55:00Z
2
value 0.02234
scoring_system epss
scoring_elements 0.84523
published_at 2026-04-08T12:55:00Z
3
value 0.02234
scoring_system epss
scoring_elements 0.84502
published_at 2026-04-07T12:55:00Z
4
value 0.02234
scoring_system epss
scoring_elements 0.845
published_at 2026-04-04T12:55:00Z
5
value 0.02234
scoring_system epss
scoring_elements 0.84559
published_at 2026-04-18T12:55:00Z
6
value 0.02234
scoring_system epss
scoring_elements 0.84538
published_at 2026-04-13T12:55:00Z
7
value 0.02234
scoring_system epss
scoring_elements 0.84543
published_at 2026-04-12T12:55:00Z
8
value 0.02234
scoring_system epss
scoring_elements 0.84548
published_at 2026-04-11T12:55:00Z
9
value 0.1074
scoring_system epss
scoring_elements 0.93362
published_at 2026-04-26T12:55:00Z
10
value 0.1074
scoring_system epss
scoring_elements 0.93366
published_at 2026-04-24T12:55:00Z
11
value 0.1074
scoring_system epss
scoring_elements 0.93361
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29526
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://jira.xwiki.org/browse/XRENDERING-694
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T20:45:02Z/
url https://jira.xwiki.org/browse/XRENDERING-694
3
reference_url https://jira.xwiki.org/browse/XWIKI-20394
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T20:45:02Z/
url https://jira.xwiki.org/browse/XWIKI-20394
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29526
reference_id CVE-2023-29526
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-29526
5
reference_url https://github.com/advisories/GHSA-gpq5-7p34-vqx5
reference_id GHSA-gpq5-7p34-vqx5
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gpq5-7p34-vqx5
6
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gpq5-7p34-vqx5
reference_id GHSA-gpq5-7p34-vqx5
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
3
value CRITICAL
scoring_system generic_textual
scoring_elements
4
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T20:45:02Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gpq5-7p34-vqx5
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.8
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.8
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.3
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.3
aliases CVE-2023-29526, GHSA-gpq5-7p34-vqx5
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqgg-gxsf-tqh1
4
url VCID-xms6-msad-wkgm
vulnerability_id VCID-xms6-msad-wkgm
summary
org.xwiki.platform:xwiki-platform-oldcore vulnerable to data leak through deleted documents
### Impact

Rights added to a document are not taken into account for viewing it once it's deleted. Note that this vulnerability only impact deleted documents that where containing view rights: the view rights provided on a space of a deleted document are properly checked.

### Patches

The problem has been patched in XWiki 14.10 by checking the rights of current user: only admin and deleter of the document are allowed to view it.

### Workarounds

There is no workaround for this vulnerability other than upgrading.

### References

 * Jira ticket: https://jira.xwiki.org/browse/XWIKI-16285
 * Commit: https://github.com/xwiki/xwiki-platform/commit/d9e947559077e947315bf700c5703dfc7dd8a8d7

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](https://jira.xwiki.org)
* Email us at [security ML](mailto:security@xwiki.org)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29208
reference_id
reference_type
scores
0
value 0.00246
scoring_system epss
scoring_elements 0.47899
published_at 2026-04-26T12:55:00Z
1
value 0.00263
scoring_system epss
scoring_elements 0.49682
published_at 2026-04-07T12:55:00Z
2
value 0.00263
scoring_system epss
scoring_elements 0.49722
published_at 2026-04-13T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49721
published_at 2026-04-12T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.49749
published_at 2026-04-11T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49737
published_at 2026-04-08T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49703
published_at 2026-04-02T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49731
published_at 2026-04-09T12:55:00Z
8
value 0.00364
scoring_system epss
scoring_elements 0.58467
published_at 2026-04-24T12:55:00Z
9
value 0.00364
scoring_system epss
scoring_elements 0.58501
published_at 2026-04-21T12:55:00Z
10
value 0.00364
scoring_system epss
scoring_elements 0.58522
published_at 2026-04-18T12:55:00Z
11
value 0.00364
scoring_system epss
scoring_elements 0.58518
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29208
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/d9e947559077e947315bf700c5703dfc7dd8a8d7
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:08:42Z/
url https://github.com/xwiki/xwiki-platform/commit/d9e947559077e947315bf700c5703dfc7dd8a8d7
3
reference_url https://jira.xwiki.org/browse/XWIKI-16285
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:08:42Z/
url https://jira.xwiki.org/browse/XWIKI-16285
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29208
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-29208
5
reference_url https://github.com/advisories/GHSA-4f8g-fq6x-jqrr
reference_id GHSA-4f8g-fq6x-jqrr
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4f8g-fq6x-jqrr
6
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8g-fq6x-jqrr
reference_id GHSA-4f8g-fq6x-jqrr
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-06T17:08:42Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8g-fq6x-jqrr
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.7
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.7
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10
aliases CVE-2023-29208, GHSA-4f8g-fq6x-jqrr
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xms6-msad-wkgm
Fixing_vulnerabilities
0
url VCID-3gd6-stuu-qkha
vulnerability_id VCID-3gd6-stuu-qkha
summary
XWiki Platform subject to Uncontrolled Resource Consumption
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to make the farm unusable by adding an object to a page with a huge number (e.g. 67108863). Most of the time this will fill the memory allocated to XWiki and make it unusable every time this document is manipulated. This issue has been patched in XWiki 14.0-rc-1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-26470
reference_id
reference_type
scores
0
value 0.00539
scoring_system epss
scoring_elements 0.67561
published_at 2026-04-02T12:55:00Z
1
value 0.00539
scoring_system epss
scoring_elements 0.67657
published_at 2026-04-26T12:55:00Z
2
value 0.00539
scoring_system epss
scoring_elements 0.67647
published_at 2026-04-24T12:55:00Z
3
value 0.00539
scoring_system epss
scoring_elements 0.67627
published_at 2026-04-21T12:55:00Z
4
value 0.00539
scoring_system epss
scoring_elements 0.67649
published_at 2026-04-18T12:55:00Z
5
value 0.00539
scoring_system epss
scoring_elements 0.67637
published_at 2026-04-16T12:55:00Z
6
value 0.00539
scoring_system epss
scoring_elements 0.67602
published_at 2026-04-13T12:55:00Z
7
value 0.00539
scoring_system epss
scoring_elements 0.67634
published_at 2026-04-12T12:55:00Z
8
value 0.00539
scoring_system epss
scoring_elements 0.67648
published_at 2026-04-11T12:55:00Z
9
value 0.00539
scoring_system epss
scoring_elements 0.67625
published_at 2026-04-09T12:55:00Z
10
value 0.00539
scoring_system epss
scoring_elements 0.67612
published_at 2026-04-08T12:55:00Z
11
value 0.00539
scoring_system epss
scoring_elements 0.6756
published_at 2026-04-07T12:55:00Z
12
value 0.00539
scoring_system epss
scoring_elements 0.67582
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-26470
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/04e5a89d2879b160cdfaea846024d3d9c1a525e6
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:40:50Z/
url https://github.com/xwiki/xwiki-platform/commit/04e5a89d2879b160cdfaea846024d3d9c1a525e6
3
reference_url https://github.com/xwiki/xwiki-platform/commit/db3d1c62fc5fb59fefcda3b86065d2d362f55164
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:40:50Z/
url https://github.com/xwiki/xwiki-platform/commit/db3d1c62fc5fb59fefcda3b86065d2d362f55164
4
reference_url https://github.com/xwiki/xwiki-platform/commit/fdfce062642b0ac062da5cda033d25482f4600fa
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:40:50Z/
url https://github.com/xwiki/xwiki-platform/commit/fdfce062642b0ac062da5cda033d25482f4600fa
5
reference_url https://jira.xwiki.org/browse/XWIKI-19223
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:40:50Z/
url https://jira.xwiki.org/browse/XWIKI-19223
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-26470
reference_id CVE-2023-26470
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-26470
7
reference_url https://github.com/advisories/GHSA-92wp-r7hm-42g7
reference_id GHSA-92wp-r7hm-42g7
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-92wp-r7hm-42g7
8
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-92wp-r7hm-42g7
reference_id GHSA-92wp-r7hm-42g7
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:40:50Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-92wp-r7hm-42g7
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.0-rc-1
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.0-rc-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dnqk-983h-u3et
1
vulnerability VCID-gxbk-2r83-kbav
2
vulnerability VCID-mpyn-zkgb-mfe8
3
vulnerability VCID-vqgg-gxsf-tqh1
4
vulnerability VCID-xms6-msad-wkgm
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.0-rc-1
aliases CVE-2023-26470, GHSA-92wp-r7hm-42g7
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3gd6-stuu-qkha
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.0-rc-1