Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.0.0-rc-1
Typemaven
Namespaceorg.xwiki.platform
Namexwiki-platform-legacy-oldcore
Version17.0.0-rc-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version17.2.0-rc-1
Latest_non_vulnerable_version17.10.1
Affected_by_vulnerabilities
0
url VCID-3m9j-nt38-x3hq
vulnerability_id VCID-3m9j-nt38-x3hq
summary
XWiki leaks password hashes and other accessible password properties
### Impact
Any user with edit right on a page of the wiki can create an XClass with a database list property that references a password property, for example the password hash that is stored for users. When adding an object of that XClass, the content of that password property is displayed. In practice, with a standard rights setup, this means that any user with an account on the wiki can access password hashes of all users, and possibly other password properties (with hashed or plain storage) that are on pages that the user can view.

### Patches
This vulnerability has been pached in XWiki 16.4.7, 16.10.5, and 17.2.0 by disallowing the use of password properties in database list properties. Additionally, queries for email properties are disallowed, too, when email obfuscation is enabled.

### Workarounds
We're not aware of any workarounds.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-54124
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07431
published_at 2026-04-13T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07455
published_at 2026-04-11T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07442
published_at 2026-04-12T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07345
published_at 2026-04-18T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07358
published_at 2026-04-16T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09307
published_at 2026-04-08T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09267
published_at 2026-04-02T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09232
published_at 2026-04-07T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09318
published_at 2026-04-04T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.0935
published_at 2026-04-09T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11826
published_at 2026-04-21T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11794
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-54124
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/f2ca8649cba2ed3765061660bf5c7f801afa0b24
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-06T20:27:54Z/
url https://github.com/xwiki/xwiki-platform/commit/f2ca8649cba2ed3765061660bf5c7f801afa0b24
3
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-r38m-cgpg-qj69
reference_id
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-06T20:27:54Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-r38m-cgpg-qj69
4
reference_url https://jira.xwiki.org/browse/XWIKI-22811
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-06T20:27:54Z/
url https://jira.xwiki.org/browse/XWIKI-22811
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-54124
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-54124
6
reference_url https://github.com/advisories/GHSA-r38m-cgpg-qj69
reference_id GHSA-r38m-cgpg-qj69
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r38m-cgpg-qj69
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.2.0-rc-1
purl pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.2.0-rc-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.2.0-rc-1
aliases CVE-2025-54124, GHSA-r38m-cgpg-qj69
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3m9j-nt38-x3hq
1
url VCID-4tnv-dtd4-ubc5
vulnerability_id VCID-4tnv-dtd4-ubc5
summary XWiki vulnerable to remote code execution with script right through unprotected Velocity scripting API
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33229
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09526
published_at 2026-04-09T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20089
published_at 2026-04-24T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20209
published_at 2026-04-21T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.2969
published_at 2026-04-11T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29646
published_at 2026-04-12T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29595
published_at 2026-04-13T12:55:00Z
6
value 0.00155
scoring_system epss
scoring_elements 0.36299
published_at 2026-04-16T12:55:00Z
7
value 0.00155
scoring_system epss
scoring_elements 0.36282
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33229
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/9fe84da66184c05953df9466cf3a4acd15a46e63
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-10T20:32:55Z/
url https://github.com/xwiki/xwiki-platform/commit/9fe84da66184c05953df9466cf3a4acd15a46e63
3
reference_url https://jira.xwiki.org/browse/XWIKI-23698
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-10T20:32:55Z/
url https://jira.xwiki.org/browse/XWIKI-23698
4
reference_url https://jira.xwiki.org/browse/XWIKI-23702
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-10T20:32:55Z/
url https://jira.xwiki.org/browse/XWIKI-23702
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-33229
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-33229
6
reference_url https://github.com/advisories/GHSA-h259-74h5-4rh9
reference_id GHSA-h259-74h5-4rh9
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h259-74h5-4rh9
7
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h259-74h5-4rh9
reference_id GHSA-h259-74h5-4rh9
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-10T20:32:55Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h259-74h5-4rh9
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.4.8
purl pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.4.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.4.8
1
url pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.10.1
purl pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.10.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.10.1
aliases CVE-2026-33229, GHSA-h259-74h5-4rh9
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4tnv-dtd4-ubc5
2
url VCID-p59s-q94b-9kb6
vulnerability_id VCID-p59s-q94b-9kb6
summary
XWiki exposes passwords and emails stored in fields not named password/email in xml.vm
### Impact
The XML export of a page in XWiki that can be triggered by any user with view rights on a page by appending `?xpage=xml` to the URL includes password and email properties stored on a document that aren't named `password` or `email`. This allows any user to obtain the salted and hashed user account validation or password reset token. As those tokens are randomly generated strings, the immediate impact of this should be low. The user's password and email itself aren't exposed as those fields are named `password` and `email` and thus aren't affected. However, depending on how the wiki is used, there could be extensions or custom code that store passwords in plain text in such password properties that would be exposed by this vulnerability.

### Patches
This vulnerability has been fixed by completely removing the output of password and email fields in this XML export in versions 17.2.0 RC1, 16.10.5 and 16.4.7.

### Workarounds
If this XML export isn't needed, the file `templates/xml.vm` in the deployed WAR can be deleted. There isn't any feature in XWiki itself that depends on this XML export.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-54125
reference_id
reference_type
scores
0
value 0.00556
scoring_system epss
scoring_elements 0.68205
published_at 2026-04-24T12:55:00Z
1
value 0.00556
scoring_system epss
scoring_elements 0.68163
published_at 2026-04-21T12:55:00Z
2
value 0.00635
scoring_system epss
scoring_elements 0.7037
published_at 2026-04-04T12:55:00Z
3
value 0.00635
scoring_system epss
scoring_elements 0.70395
published_at 2026-04-08T12:55:00Z
4
value 0.00635
scoring_system epss
scoring_elements 0.70349
published_at 2026-04-07T12:55:00Z
5
value 0.00635
scoring_system epss
scoring_elements 0.70455
published_at 2026-04-18T12:55:00Z
6
value 0.00635
scoring_system epss
scoring_elements 0.70446
published_at 2026-04-16T12:55:00Z
7
value 0.00635
scoring_system epss
scoring_elements 0.70404
published_at 2026-04-13T12:55:00Z
8
value 0.00635
scoring_system epss
scoring_elements 0.70418
published_at 2026-04-12T12:55:00Z
9
value 0.00635
scoring_system epss
scoring_elements 0.70433
published_at 2026-04-11T12:55:00Z
10
value 0.00635
scoring_system epss
scoring_elements 0.7041
published_at 2026-04-09T12:55:00Z
11
value 0.00635
scoring_system epss
scoring_elements 0.70353
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-54125
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/742ee3482ef6c2bd4ad03d0de9cdd81d0e8f3d59
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-06T20:28:50Z/
url https://github.com/xwiki/xwiki-platform/commit/742ee3482ef6c2bd4ad03d0de9cdd81d0e8f3d59
3
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-57q2-6cp4-9mq3
reference_id
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-06T20:28:50Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-57q2-6cp4-9mq3
4
reference_url https://jira.xwiki.org/browse/XWIKI-22810
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-06T20:28:50Z/
url https://jira.xwiki.org/browse/XWIKI-22810
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-54125
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-54125
6
reference_url https://github.com/advisories/GHSA-57q2-6cp4-9mq3
reference_id GHSA-57q2-6cp4-9mq3
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-57q2-6cp4-9mq3
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.2.0-rc-1
purl pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.2.0-rc-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.2.0-rc-1
aliases CVE-2025-54125, GHSA-57q2-6cp4-9mq3
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p59s-q94b-9kb6
3
url VCID-zha9-bprb-6ucp
vulnerability_id VCID-zha9-bprb-6ucp
summary
XWiki's REST APIs can list all pages/spaces, leading to unavailability
### Impact
REST API endpoints like `/xwiki/rest/wikis/xwiki/spaces/AnnotationCode/pages/AnnotationConfig/objects/AnnotationCode.AnnotationConfig/0/properties` list all available pages as part of the metadata for database list properties, which can exhaust available resources on large wikis.

### Patches
This problem has been patched by applying the configured query limit also to the available values for database list properties in XWiki 16.10.16, 17.4.8 and 17.10.1.

### Workarounds
We're not aware of any workarounds apart from upgrading the affected modules.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-40104
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.10787
published_at 2026-04-16T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11138
published_at 2026-04-18T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.1524
published_at 2026-04-21T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22601
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-40104
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/47b568c4753a6e682b14be1ca581bdd3b25d45a7
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:08:13Z/
url https://github.com/xwiki/xwiki-platform/commit/47b568c4753a6e682b14be1ca581bdd3b25d45a7
3
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mrqg-xmgm-rc5g
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:08:13Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mrqg-xmgm-rc5g
4
reference_url https://jira.xwiki.org/browse/XWIKI-23550
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:08:13Z/
url https://jira.xwiki.org/browse/XWIKI-23550
5
reference_url https://github.com/advisories/GHSA-mrqg-xmgm-rc5g
reference_id GHSA-mrqg-xmgm-rc5g
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mrqg-xmgm-rc5g
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.4.8
purl pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.4.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.4.8
1
url pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.10.1
purl pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.10.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.10.1
aliases CVE-2026-40104, GHSA-mrqg-xmgm-rc5g
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zha9-bprb-6ucp
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-legacy-oldcore@17.0.0-rc-1