Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-4czm-tywp-h3er |
| Summary | XWiki Platform vulnerable to privilege escalation and remote code execution via the edit action
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible for a user to execute any content with the right of an existing document's content author, provided the user have edit right on it. A crafted URL of the form ` /xwiki/bin/edit//?content=%7B%7Bgroovy%7D%7Dprintln%28%22Hello+from+ Groovy%21%22%29%7B%7B%2Fgroovy%7D%7D&xpage=view` can be used to execute arbitrary groovy code on the server. This vulnerability has been patched in XWiki versions 14.10.6 and 15.2RC1. Users are advised to update. There are no known workarounds for this issue. |
| Aliases |
| 0 |
|
| 1 |
| alias |
GHSA-g2qq-c5j9-5w5w |
|
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46243 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91751 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91764 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91757 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91798 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91797 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91805 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91785 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91789 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91787 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91784 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.07479 |
| scoring_system |
epss |
| scoring_elements |
0.91777 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46243 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://jira.xwiki.org/browse/XWIKI-20385 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
10 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
|
| 1 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track* |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-04T15:50:55Z/ |
|
|
| url |
https://jira.xwiki.org/browse/XWIKI-20385 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
1035 |
| name |
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017. |
|
| 1 |
| cwe_id |
937 |
| name |
OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013. |
|
| 2 |
| cwe_id |
94 |
| name |
Improper Control of Generation of Code ('Code Injection') |
| description |
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
|
|
| Exploits |
|
| Severity_range_score | 7.0 - 10.0 |
| Exploitability | 0.5 |
| Weighted_severity | 9.0 |
| Risk_score | 4.5 |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-4czm-tywp-h3er |