Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-mpyn-zkgb-mfe8
Summary
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can edit their own user profile can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The same vulnerability can also be exploited in other contexts where the `display` method on a document is used to display a field with wiki syntax, for example in applications created using `App Within Minutes`. This has been patched in XWiki 13.10.11, 14.4.8, 14.10.2 and 15.0RC1. There is no workaround apart from upgrading.
Aliases
0
alias CVE-2023-29523
1
alias GHSA-x764-ff8r-9hpx
Fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@13.10.11
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.8
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.4.8
2
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.2
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.2
Affected_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@3.3-milestone-1
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@3.3-milestone-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mpyn-zkgb-mfe8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@3.3-milestone-1
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.0-rc-1
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.0-rc-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dnqk-983h-u3et
1
vulnerability VCID-gxbk-2r83-kbav
2
vulnerability VCID-mpyn-zkgb-mfe8
3
vulnerability VCID-vqgg-gxsf-tqh1
4
vulnerability VCID-xms6-msad-wkgm
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.0-rc-1
2
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.5
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gxbk-2r83-kbav
1
vulnerability VCID-ka4y-na7f-5kcc
2
vulnerability VCID-mgyt-2kx1-9yfz
3
vulnerability VCID-mpyn-zkgb-mfe8
4
vulnerability VCID-vqgg-gxsf-tqh1
5
vulnerability VCID-xms6-msad-wkgm
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.5
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29523
reference_id
reference_type
scores
0
value 0.0532
scoring_system epss
scoring_elements 0.90075
published_at 2026-04-24T12:55:00Z
1
value 0.0532
scoring_system epss
scoring_elements 0.90058
published_at 2026-04-21T12:55:00Z
2
value 0.0532
scoring_system epss
scoring_elements 0.90076
published_at 2026-04-26T12:55:00Z
3
value 0.07623
scoring_system epss
scoring_elements 0.91852
published_at 2026-04-07T12:55:00Z
4
value 0.07623
scoring_system epss
scoring_elements 0.91865
published_at 2026-04-08T12:55:00Z
5
value 0.07623
scoring_system epss
scoring_elements 0.91838
published_at 2026-04-02T12:55:00Z
6
value 0.07623
scoring_system epss
scoring_elements 0.91885
published_at 2026-04-18T12:55:00Z
7
value 0.07623
scoring_system epss
scoring_elements 0.91889
published_at 2026-04-16T12:55:00Z
8
value 0.07623
scoring_system epss
scoring_elements 0.91874
published_at 2026-04-12T12:55:00Z
9
value 0.07623
scoring_system epss
scoring_elements 0.91844
published_at 2026-04-04T12:55:00Z
10
value 0.07623
scoring_system epss
scoring_elements 0.9187
published_at 2026-04-13T12:55:00Z
11
value 0.1064
scoring_system epss
scoring_elements 0.93327
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29523
1
reference_url https://extensions.xwiki.org/xwiki/bin/view/Extension/App%20Within%20Minutes%20Application
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://extensions.xwiki.org/xwiki/bin/view/Extension/App%20Within%20Minutes%20Application
2
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
3
reference_url https://github.com/xwiki/xwiki-platform/commit/0d547181389f7941e53291af940966413823f61c
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://github.com/xwiki/xwiki-platform/commit/0d547181389f7941e53291af940966413823f61c
4
reference_url https://jira.xwiki.org/browse/XWIKI-20327
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://jira.xwiki.org/browse/XWIKI-20327
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29523
reference_id CVE-2023-29523
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-29523
6
reference_url https://github.com/advisories/GHSA-x764-ff8r-9hpx
reference_id GHSA-x764-ff8r-9hpx
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x764-ff8r-9hpx
7
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x764-ff8r-9hpx
reference_id GHSA-x764-ff8r-9hpx
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
3
value CRITICAL
scoring_system generic_textual
scoring_elements
4
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-05T18:47:38Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x764-ff8r-9hpx
Weaknesses
0
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
1
cwe_id 74
name Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
description The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
2
cwe_id 78
name Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
description The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
3
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score9.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-mpyn-zkgb-mfe8