Lookup for vulnerable packages by Package URL.
| Purl | pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.2 |
| Type | maven |
| Namespace | org.xwiki.platform |
| Name | xwiki-platform-oldcore |
| Version | 14.2 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 14.3-rc-1 |
| Latest_non_vulnerable_version | 17.10.1 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-4mj5-repk-zyg2 |
| vulnerability_id |
VCID-4mj5-repk-zyg2 |
| summary |
XWiki Platform vulnerable to document deletion and overwrite from edit
### Impact
When a user has edit but not view right on a page in XWiki, that user can delete the page and replace it by a page with new content without having delete right. The previous version of the page is moved into the recycle bin and can be restored from there by an admin. As the user is recorded as deleter, the user would in theory also be able to view the deleted content, but this is not directly possible as rights of the previous version are transferred to the new page and thus the user still doesn't have view right on the page. From all we examined, it therefore doesn't seem to be possible to exploit this to gain any rights.
To reproduce, just replace `view` by `edit` in the URL of a page that you cannot view but edit and save. This should send the page to the recycle bin and replace it by an empty one if the XWiki installation is vulnerable. After the fix, an error is displayed when saving.
### Patches
This has been patched in XWiki 14.10.21, 15.5.5 and 15.10.6 by cancelling save operations by users when a new document shall be saved despite the document's existing already.
### Workarounds
We're not aware of any workarounds.
### References
* https://jira.xwiki.org/browse/XWIKI-21553
* https://github.com/xwiki/xwiki-platform/commit/c5efc1e519e710afdf3c5f40c0fcc300ad77149f |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-37898 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38776 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38566 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.3873 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.3881 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38832 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38787 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38815 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38839 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38828 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38827 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38847 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00174 |
| scoring_system |
epss |
| scoring_elements |
0.38851 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-37898 |
|
| 1 |
| reference_url |
https://github.com/xwiki/xwiki-platform |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/xwiki/xwiki-platform |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://jira.xwiki.org/browse/XWIKI-21553 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T17:33:15Z/ |
|
|
| url |
https://jira.xwiki.org/browse/XWIKI-21553 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-37898, GHSA-33gp-gmg3-hfpq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4mj5-repk-zyg2 |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-f9gd-r31y-dycc |
| vulnerability_id |
VCID-f9gd-r31y-dycc |
| summary |
XWiki Platform Old Core vulnerable to Authentication Bypass Using the Login Action
### Impact
All rights checks that would normally prevent a user from viewing a document on a wiki can be bypassed using the login action and directly specified templates. This exposes title, content and comments of any document and properties of objects (class and property name must be known, though). This is also exploitable on [private wikis](https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Access%20Rights/#HPrivateWiki).
### Patches
This has been patched in versions 14.2 and 13.10.4 by properly checking view rights before loading documents and disallowing non-default templates in the login, registration and skin action.
### Workarounds
It would be possible to protect all templates individually by adding code to check access rights first, but due to the number of templates and the fact that some of them need to be used without view rights, this seems impractical.
### References
* https://jira.xwiki.org/browse/XWIKI-19549
* https://jira.xwiki.org/browse/XWIKI-18602
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [security mailing-list](mailto:security@xwiki.com) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-36092 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52738 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52705 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52732 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52697 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52749 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52743 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52794 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52777 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52761 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52799 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52806 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.5279 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-36092 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-36092, GHSA-8h89-34w2-jpfm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f9gd-r31y-dycc |
|
|
| Risk_score | 3.1 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.2 |