Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.4
Typemaven
Namespaceorg.xwiki.platform
Namexwiki-platform-oldcore
Version13.10.4
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version13.10.5
Latest_non_vulnerable_version17.10.1
Affected_by_vulnerabilities
0
url VCID-4mj5-repk-zyg2
vulnerability_id VCID-4mj5-repk-zyg2
summary
XWiki Platform vulnerable to document deletion and overwrite from edit
### Impact

When a user has edit but not view right on a page in XWiki, that user can delete the page and replace it by a page with new content without having delete right. The previous version of the page is moved into the recycle bin and can be restored from there by an admin. As the user is recorded as deleter, the user would in theory also be able to view the deleted content, but this is not directly possible as rights of the previous version are transferred to the new page and thus the user still doesn't have view right on the page. From all we examined, it therefore doesn't seem to be possible to exploit this to gain any rights.

To reproduce, just replace `view` by `edit` in the URL of a page that you cannot view but edit and save. This should send the page to the recycle bin and replace it by an empty one if the XWiki installation is vulnerable. After the fix, an error is displayed when saving.

### Patches
This has been patched in XWiki 14.10.21, 15.5.5 and 15.10.6 by cancelling save operations by users when a new document shall be saved despite the document's existing already.

### Workarounds
We're not aware of any workarounds.

### References
* https://jira.xwiki.org/browse/XWIKI-21553
* https://github.com/xwiki/xwiki-platform/commit/c5efc1e519e710afdf3c5f40c0fcc300ad77149f
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-37898
reference_id
reference_type
scores
0
value 0.00174
scoring_system epss
scoring_elements 0.38776
published_at 2026-04-07T12:55:00Z
1
value 0.00174
scoring_system epss
scoring_elements 0.38566
published_at 2026-04-24T12:55:00Z
2
value 0.00174
scoring_system epss
scoring_elements 0.3873
published_at 2026-04-21T12:55:00Z
3
value 0.00174
scoring_system epss
scoring_elements 0.3881
published_at 2026-04-18T12:55:00Z
4
value 0.00174
scoring_system epss
scoring_elements 0.38832
published_at 2026-04-16T12:55:00Z
5
value 0.00174
scoring_system epss
scoring_elements 0.38787
published_at 2026-04-13T12:55:00Z
6
value 0.00174
scoring_system epss
scoring_elements 0.38815
published_at 2026-04-12T12:55:00Z
7
value 0.00174
scoring_system epss
scoring_elements 0.38839
published_at 2026-04-09T12:55:00Z
8
value 0.00174
scoring_system epss
scoring_elements 0.38828
published_at 2026-04-08T12:55:00Z
9
value 0.00174
scoring_system epss
scoring_elements 0.38827
published_at 2026-04-02T12:55:00Z
10
value 0.00174
scoring_system epss
scoring_elements 0.38847
published_at 2026-04-04T12:55:00Z
11
value 0.00174
scoring_system epss
scoring_elements 0.38851
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-37898
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/0bc27d6ec63c8a505ff950e2d1792cb4f773c22e
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T17:33:15Z/
url https://github.com/xwiki/xwiki-platform/commit/0bc27d6ec63c8a505ff950e2d1792cb4f773c22e
3
reference_url https://github.com/xwiki/xwiki-platform/commit/56f5d8aab7371d5ba891168f73890806551322c5
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T17:33:15Z/
url https://github.com/xwiki/xwiki-platform/commit/56f5d8aab7371d5ba891168f73890806551322c5
4
reference_url https://github.com/xwiki/xwiki-platform/commit/c5efc1e519e710afdf3c5f40c0fcc300ad77149f
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T17:33:15Z/
url https://github.com/xwiki/xwiki-platform/commit/c5efc1e519e710afdf3c5f40c0fcc300ad77149f
5
reference_url https://github.com/xwiki/xwiki-platform/commit/e4968fe268e5644ffd9bfa4ef6257d2796446009
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T17:33:15Z/
url https://github.com/xwiki/xwiki-platform/commit/e4968fe268e5644ffd9bfa4ef6257d2796446009
6
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-33gp-gmg3-hfpq
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T17:33:15Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-33gp-gmg3-hfpq
7
reference_url https://jira.xwiki.org/browse/XWIKI-21553
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T17:33:15Z/
url https://jira.xwiki.org/browse/XWIKI-21553
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-37898
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-37898
9
reference_url https://github.com/advisories/GHSA-33gp-gmg3-hfpq
reference_id GHSA-33gp-gmg3-hfpq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-33gp-gmg3-hfpq
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.21
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.21
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.21
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.5.5
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.5.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.5.5
2
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.10.6
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.10.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.10.6
aliases CVE-2024-37898, GHSA-33gp-gmg3-hfpq
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4mj5-repk-zyg2
Fixing_vulnerabilities
0
url VCID-dnqk-983h-u3et
vulnerability_id VCID-dnqk-983h-u3et
summary
XWiki.WebHome vulnerable to Improper Privilege Management in XWiki resolving groups
### Impact

It's possible to exploit a bug in XWikiRights resolution of groups to obtain privilege escalation. 

More specifically, editing a right with the object editor leads to adding a supplementary empty value to groups which is then resolved as a reference to XWiki.WebHome page. Adding an XWikiGroup xobject to that page then transforms it to a group, any user put in that group would then obtain the privileges related to the edited right.

Note that this security issue is normally mitigated by the fact that XWiki.WebHome (and XWiki space in general) should be protected by default for edit rights. 

### Patches

The problem has been patched in XWiki 13.10.4 and 14.2RC1 to not consider anymore empty values in XWikiRights. 

### Workarounds

It's possible to workaround the problem by setting appropriate rights on XWiki.WebHome page to prevent users to edit it. 

### References

* https://jira.xwiki.org/browse/XWIKI-18386
* https://jira.xwiki.org/browse/XWIKI-15776

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org)
* Email us at [Security Mailing List](mailto:security@xwiki.org)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31166
reference_id
reference_type
scores
0
value 0.01997
scoring_system epss
scoring_elements 0.83705
published_at 2026-04-24T12:55:00Z
1
value 0.01997
scoring_system epss
scoring_elements 0.83592
published_at 2026-04-02T12:55:00Z
2
value 0.01997
scoring_system epss
scoring_elements 0.83606
published_at 2026-04-04T12:55:00Z
3
value 0.01997
scoring_system epss
scoring_elements 0.83608
published_at 2026-04-07T12:55:00Z
4
value 0.01997
scoring_system epss
scoring_elements 0.83632
published_at 2026-04-08T12:55:00Z
5
value 0.01997
scoring_system epss
scoring_elements 0.8364
published_at 2026-04-09T12:55:00Z
6
value 0.01997
scoring_system epss
scoring_elements 0.83657
published_at 2026-04-11T12:55:00Z
7
value 0.01997
scoring_system epss
scoring_elements 0.83649
published_at 2026-04-12T12:55:00Z
8
value 0.01997
scoring_system epss
scoring_elements 0.83645
published_at 2026-04-13T12:55:00Z
9
value 0.01997
scoring_system epss
scoring_elements 0.8368
published_at 2026-04-16T12:55:00Z
10
value 0.01997
scoring_system epss
scoring_elements 0.83681
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31166
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/pull/1800
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:42:19Z/
url https://github.com/xwiki/xwiki-platform/pull/1800
3
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g4h6-qp44-wqvx
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:42:19Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g4h6-qp44-wqvx
4
reference_url https://jira.xwiki.org/browse/XWIKI-15776
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:42:19Z/
url https://jira.xwiki.org/browse/XWIKI-15776
5
reference_url https://jira.xwiki.org/browse/XWIKI-18386
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:42:19Z/
url https://jira.xwiki.org/browse/XWIKI-18386
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-31166
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-31166
7
reference_url https://github.com/advisories/GHSA-g4h6-qp44-wqvx
reference_id GHSA-g4h6-qp44-wqvx
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g4h6-qp44-wqvx
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.4
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4mj5-repk-zyg2
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.4
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.2-rc-1
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.2-rc-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.2-rc-1
aliases CVE-2022-31166, GHSA-g4h6-qp44-wqvx
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dnqk-983h-u3et
1
url VCID-f9gd-r31y-dycc
vulnerability_id VCID-f9gd-r31y-dycc
summary
XWiki Platform Old Core vulnerable to Authentication Bypass Using the Login Action
### Impact
All rights checks that would normally prevent a user from viewing a document on a wiki can be bypassed using the login action and directly specified templates. This exposes title, content and comments of any document and properties of objects (class and property name must be known, though). This is also exploitable on [private wikis](https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Access%20Rights/#HPrivateWiki).

### Patches
This has been patched in versions 14.2 and 13.10.4 by properly checking view rights before loading documents and disallowing non-default templates in the login, registration and skin action.

### Workarounds
It would be possible to protect all templates individually by adding code to check access rights first, but due to the number of templates and the fact that some of them need to be used without view rights, this seems impractical.

### References
* https://jira.xwiki.org/browse/XWIKI-19549
* https://jira.xwiki.org/browse/XWIKI-18602

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [security mailing-list](mailto:security@xwiki.com)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36092
reference_id
reference_type
scores
0
value 0.00294
scoring_system epss
scoring_elements 0.52738
published_at 2026-04-24T12:55:00Z
1
value 0.00294
scoring_system epss
scoring_elements 0.52705
published_at 2026-04-02T12:55:00Z
2
value 0.00294
scoring_system epss
scoring_elements 0.52732
published_at 2026-04-04T12:55:00Z
3
value 0.00294
scoring_system epss
scoring_elements 0.52697
published_at 2026-04-07T12:55:00Z
4
value 0.00294
scoring_system epss
scoring_elements 0.52749
published_at 2026-04-08T12:55:00Z
5
value 0.00294
scoring_system epss
scoring_elements 0.52743
published_at 2026-04-09T12:55:00Z
6
value 0.00294
scoring_system epss
scoring_elements 0.52794
published_at 2026-04-11T12:55:00Z
7
value 0.00294
scoring_system epss
scoring_elements 0.52777
published_at 2026-04-12T12:55:00Z
8
value 0.00294
scoring_system epss
scoring_elements 0.52761
published_at 2026-04-13T12:55:00Z
9
value 0.00294
scoring_system epss
scoring_elements 0.52799
published_at 2026-04-16T12:55:00Z
10
value 0.00294
scoring_system epss
scoring_elements 0.52806
published_at 2026-04-18T12:55:00Z
11
value 0.00294
scoring_system epss
scoring_elements 0.5279
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36092
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:44Z/
url https://github.com/xwiki/xwiki-platform/commit/71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb
3
reference_url https://github.com/xwiki/xwiki-platform/commit/9b7057d57a941592d763992d4299456300918208
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:44Z/
url https://github.com/xwiki/xwiki-platform/commit/9b7057d57a941592d763992d4299456300918208
4
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8h89-34w2-jpfm
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:44Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8h89-34w2-jpfm
5
reference_url https://jira.xwiki.org/browse/XWIKI-18602
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:44Z/
url https://jira.xwiki.org/browse/XWIKI-18602
6
reference_url https://jira.xwiki.org/browse/XWIKI-19549
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:44Z/
url https://jira.xwiki.org/browse/XWIKI-19549
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36092
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36092
8
reference_url https://github.com/advisories/GHSA-8h89-34w2-jpfm
reference_id GHSA-8h89-34w2-jpfm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8h89-34w2-jpfm
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.4
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4mj5-repk-zyg2
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.4
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.2
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4mj5-repk-zyg2
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.2
aliases CVE-2022-36092, GHSA-8h89-34w2-jpfm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f9gd-r31y-dycc
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.4