Lookup for vulnerable packages by Package URL.
| Purl | pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.4 |
| Type | maven |
| Namespace | org.xwiki.platform |
| Name | xwiki-platform-oldcore |
| Version | 13.10.4 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 13.10.5 |
| Latest_non_vulnerable_version | 17.10.1 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-4mj5-repk-zyg2 |
| vulnerability_id |
VCID-4mj5-repk-zyg2 |
| summary |
XWiki Platform vulnerable to document deletion and overwrite from edit
### Impact
When a user has edit but not view right on a page in XWiki, that user can delete the page and replace it by a page with new content without having delete right. The previous version of the page is moved into the recycle bin and can be restored from there by an admin. As the user is recorded as deleter, the user would in theory also be able to view the deleted content, but this is not directly possible as rights of the previous version are transferred to the new page and thus the user still doesn't have view right on the page. From all we examined, it therefore doesn't seem to be possible to exploit this to gain any rights.
To reproduce, just replace `view` by `edit` in the URL of a page that you cannot view but edit and save. This should send the page to the recycle bin and replace it by an empty one if the XWiki installation is vulnerable. After the fix, an error is displayed when saving.
### Patches
This has been patched in XWiki 14.10.21, 15.5.5 and 15.10.6 by cancelling save operations by users when a new document shall be saved despite the document's existing already.
### Workarounds
We're not aware of any workarounds.
### References
* https://jira.xwiki.org/browse/XWIKI-21553
* https://github.com/xwiki/xwiki-platform/commit/c5efc1e519e710afdf3c5f40c0fcc300ad77149f |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-37898 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38776 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38566 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.3873 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.3881 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38832 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38787 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38815 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38839 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38828 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38827 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38847 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38851 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-37898 |
|
| 1 |
| reference_url |
https://github.com/xwiki/xwiki-platform |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/xwiki/xwiki-platform |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://jira.xwiki.org/browse/XWIKI-21553 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T17:33:15Z/ |
|
|
| url |
https://jira.xwiki.org/browse/XWIKI-21553 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-37898, GHSA-33gp-gmg3-hfpq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4mj5-repk-zyg2 |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-dnqk-983h-u3et |
| vulnerability_id |
VCID-dnqk-983h-u3et |
| summary |
XWiki.WebHome vulnerable to Improper Privilege Management in XWiki resolving groups
### Impact
It's possible to exploit a bug in XWikiRights resolution of groups to obtain privilege escalation.
More specifically, editing a right with the object editor leads to adding a supplementary empty value to groups which is then resolved as a reference to XWiki.WebHome page. Adding an XWikiGroup xobject to that page then transforms it to a group, any user put in that group would then obtain the privileges related to the edited right.
Note that this security issue is normally mitigated by the fact that XWiki.WebHome (and XWiki space in general) should be protected by default for edit rights.
### Patches
The problem has been patched in XWiki 13.10.4 and 14.2RC1 to not consider anymore empty values in XWikiRights.
### Workarounds
It's possible to workaround the problem by setting appropriate rights on XWiki.WebHome page to prevent users to edit it.
### References
* https://jira.xwiki.org/browse/XWIKI-18386
* https://jira.xwiki.org/browse/XWIKI-15776
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org)
* Email us at [Security Mailing List](mailto:security@xwiki.org) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-31166 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01997 |
| scoring_system |
epss |
| scoring_elements |
0.83705 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.01997 |
| scoring_system |
epss |
| scoring_elements |
0.83592 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01997 |
| scoring_system |
epss |
| scoring_elements |
0.83606 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01997 |
| scoring_system |
epss |
| scoring_elements |
0.83608 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01997 |
| scoring_system |
epss |
| scoring_elements |
0.83632 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01997 |
| scoring_system |
epss |
| scoring_elements |
0.8364 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01997 |
| scoring_system |
epss |
| scoring_elements |
0.83657 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01997 |
| scoring_system |
epss |
| scoring_elements |
0.83649 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01997 |
| scoring_system |
epss |
| scoring_elements |
0.83645 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01997 |
| scoring_system |
epss |
| scoring_elements |
0.8368 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01997 |
| scoring_system |
epss |
| scoring_elements |
0.83681 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-31166 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-31166, GHSA-g4h6-qp44-wqvx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dnqk-983h-u3et |
|
| 1 |
| url |
VCID-f9gd-r31y-dycc |
| vulnerability_id |
VCID-f9gd-r31y-dycc |
| summary |
XWiki Platform Old Core vulnerable to Authentication Bypass Using the Login Action
### Impact
All rights checks that would normally prevent a user from viewing a document on a wiki can be bypassed using the login action and directly specified templates. This exposes title, content and comments of any document and properties of objects (class and property name must be known, though). This is also exploitable on [private wikis](https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Access%20Rights/#HPrivateWiki).
### Patches
This has been patched in versions 14.2 and 13.10.4 by properly checking view rights before loading documents and disallowing non-default templates in the login, registration and skin action.
### Workarounds
It would be possible to protect all templates individually by adding code to check access rights first, but due to the number of templates and the fact that some of them need to be used without view rights, this seems impractical.
### References
* https://jira.xwiki.org/browse/XWIKI-19549
* https://jira.xwiki.org/browse/XWIKI-18602
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [security mailing-list](mailto:security@xwiki.com) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-36092 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52738 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52705 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52732 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52697 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52749 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52743 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52794 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52777 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52761 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52799 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52806 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.5279 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-36092 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-36092, GHSA-8h89-34w2-jpfm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f9gd-r31y-dycc |
|
|
| Risk_score | 3.1 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.4 |