Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.3
Typemaven
Namespaceorg.xwiki.platform
Namexwiki-platform-oldcore
Version13.10.3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version13.10.5
Latest_non_vulnerable_version17.10.1
Affected_by_vulnerabilities
0
url VCID-q2b9-583a-9yd9
vulnerability_id VCID-q2b9-583a-9yd9
summary
XWiki Platform allows remote code execution from user account
### Impact
When an admin disables a user account, the user's profile is executed with the admin's rights. This allows a user to place malicious code in the user profile before getting an admin to disable the user account.

To reproduce, as a user without script nor programming rights, edit the about section of your user profile and add `{{groovy}}services.logging.getLogger("attacker").error("Hello from Groovy!"){{/groovy}}`.
As an admin, go to the user profile and click the "Disable this account" button.
Then, reload the page. If the logs show `attacker - Hello from Groovy!` then the instance is vulnerable.

### Patches
This has been patched in XWiki 14.10.21, 15.5.5, 15.10.6 and 16.0.0.

### Workarounds
We're not aware of any workaround except upgrading.

### References
* https://jira.xwiki.org/browse/XWIKI-21611
* https://github.com/xwiki/xwiki-platform/commit/f89c8f47fad6e5cc7e68c69a7e0acde07f5eed5a
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-37899
reference_id
reference_type
scores
0
value 0.14126
scoring_system epss
scoring_elements 0.94333
published_at 2026-04-02T12:55:00Z
1
value 0.14126
scoring_system epss
scoring_elements 0.94387
published_at 2026-04-24T12:55:00Z
2
value 0.14126
scoring_system epss
scoring_elements 0.94386
published_at 2026-04-21T12:55:00Z
3
value 0.14126
scoring_system epss
scoring_elements 0.94384
published_at 2026-04-18T12:55:00Z
4
value 0.14126
scoring_system epss
scoring_elements 0.94378
published_at 2026-04-16T12:55:00Z
5
value 0.14126
scoring_system epss
scoring_elements 0.94363
published_at 2026-04-13T12:55:00Z
6
value 0.14126
scoring_system epss
scoring_elements 0.94362
published_at 2026-04-12T12:55:00Z
7
value 0.14126
scoring_system epss
scoring_elements 0.94361
published_at 2026-04-11T12:55:00Z
8
value 0.14126
scoring_system epss
scoring_elements 0.94358
published_at 2026-04-09T12:55:00Z
9
value 0.14126
scoring_system epss
scoring_elements 0.94353
published_at 2026-04-08T12:55:00Z
10
value 0.14126
scoring_system epss
scoring_elements 0.94344
published_at 2026-04-07T12:55:00Z
11
value 0.14126
scoring_system epss
scoring_elements 0.94343
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-37899
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/046c36519a2df392c922c16d0d38472b98c414d0
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform/commit/046c36519a2df392c922c16d0d38472b98c414d0
3
reference_url https://github.com/xwiki/xwiki-platform/commit/233b08b26580df4b7a595882dac65ed4e4a2419c
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform/commit/233b08b26580df4b7a595882dac65ed4e4a2419c
4
reference_url https://github.com/xwiki/xwiki-platform/commit/2b55c29562ccd20f8f0f85075f0c95b4ee9cd9be
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform/commit/2b55c29562ccd20f8f0f85075f0c95b4ee9cd9be
5
reference_url https://github.com/xwiki/xwiki-platform/commit/f8409419c5d0ddefe1bee55e73629a54275fa735
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform/commit/f8409419c5d0ddefe1bee55e73629a54275fa735
6
reference_url https://github.com/xwiki/xwiki-platform/commit/f89c8f47fad6e5cc7e68c69a7e0acde07f5eed5a
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-27T18:36:25Z/
url https://github.com/xwiki/xwiki-platform/commit/f89c8f47fad6e5cc7e68c69a7e0acde07f5eed5a
7
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-j584-j2vj-3f93
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
3
value CRITICAL
scoring_system generic_textual
scoring_elements
4
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-27T18:36:25Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-j584-j2vj-3f93
8
reference_url https://jira.xwiki.org/browse/XWIKI-21611
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-27T18:36:25Z/
url https://jira.xwiki.org/browse/XWIKI-21611
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-37899
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-37899
10
reference_url https://github.com/advisories/GHSA-j584-j2vj-3f93
reference_id GHSA-j584-j2vj-3f93
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-j584-j2vj-3f93
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.21
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.21
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.21
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.5.5
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.5.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.5.5
2
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.10.6
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.10.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.10.6
3
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@16.0.0
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@16.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@16.0.0
aliases CVE-2024-37899, GHSA-j584-j2vj-3f93
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q2b9-583a-9yd9
Fixing_vulnerabilities
0
url VCID-kfau-cw24-aqaq
vulnerability_id VCID-kfau-cw24-aqaq
summary
Path Traversal in XWiki Platform
### Impact

One can ask for any file located in the classloader using the template API and a path with ".." in it. For example 

```
{{template name="../xwiki.hbm.xml"/}}
```

To our knownledge none of the available files of the classloader in XWiki Standard contain any strong confidential data, hence the low confidentiality value of this advisory.

### Patches

The issue is patched in versions 14.0 and 13.10.3.

### Workarounds

There's no easy workaround for this issue, administrators should upgrade their wiki.

### References

 * https://jira.xwiki.org/browse/XWIKI-19349
 * https://github.com/xwiki/xwiki-platform/commit/4917c8f355717bb636d763844528b1fe0f95e8e2

### For more information

If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [security mailing list](mailto:security@xwiki.org)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29253
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19759
published_at 2026-04-04T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19389
published_at 2026-04-24T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19497
published_at 2026-04-21T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19486
published_at 2026-04-18T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19477
published_at 2026-04-16T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19512
published_at 2026-04-13T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.1957
published_at 2026-04-12T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.1971
published_at 2026-04-02T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19483
published_at 2026-04-07T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19618
published_at 2026-04-11T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19615
published_at 2026-04-09T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19562
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29253
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/4917c8f355717bb636d763844528b1fe0f95e8e2
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:06:44Z/
url https://github.com/xwiki/xwiki-platform/commit/4917c8f355717bb636d763844528b1fe0f95e8e2
3
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9qrp-h7fw-42hg
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:06:44Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9qrp-h7fw-42hg
4
reference_url https://jira.xwiki.org/browse/XWIKI-19349
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:06:44Z/
url https://jira.xwiki.org/browse/XWIKI-19349
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29253
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29253
6
reference_url https://github.com/advisories/GHSA-9qrp-h7fw-42hg
reference_id GHSA-9qrp-h7fw-42hg
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9qrp-h7fw-42hg
fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.3
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-q2b9-583a-9yd9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.3
aliases CVE-2022-29253, GHSA-9qrp-h7fw-42hg
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kfau-cw24-aqaq
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.3