Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-kx6s-546m-gkdv
Summary
Cross-Site Request Forgery (CSRF)
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to execute a content with the right of any user via a crafted URL. A user must have `programming` privileges in order to exploit this vulnerability. This issue has been patched in XWiki 14.10.7 and 15.2RC1. Users are advised to upgrade. There are no known workarounds for for this vulnerability.
Aliases
0
alias CVE-2023-46242
1
alias GHSA-hgpw-6p4h-j6h5
Fixed_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.7
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.7
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.2-rc-1
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.2-rc-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.2-rc-1
Affected_packages
0
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@1.0
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ep7-j2b3-duat
1
vulnerability VCID-4czm-tywp-h3er
2
vulnerability VCID-4fw7-4s5x-n3fv
3
vulnerability VCID-f872-dkzj-ufac
4
vulnerability VCID-kx6s-546m-gkdv
5
vulnerability VCID-q5t9-725x-dkb1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@1.0
1
url pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.0
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4czm-tywp-h3er
1
vulnerability VCID-4mj5-repk-zyg2
2
vulnerability VCID-kx6s-546m-gkdv
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.0
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46242
reference_id
reference_type
scores
0
value 0.03252
scoring_system epss
scoring_elements 0.8708
published_at 2026-04-02T12:55:00Z
1
value 0.03252
scoring_system epss
scoring_elements 0.87092
published_at 2026-04-07T12:55:00Z
2
value 0.03252
scoring_system epss
scoring_elements 0.87098
published_at 2026-04-04T12:55:00Z
3
value 0.03252
scoring_system epss
scoring_elements 0.8714
published_at 2026-04-21T12:55:00Z
4
value 0.03252
scoring_system epss
scoring_elements 0.87143
published_at 2026-04-18T12:55:00Z
5
value 0.03252
scoring_system epss
scoring_elements 0.87139
published_at 2026-04-16T12:55:00Z
6
value 0.03252
scoring_system epss
scoring_elements 0.87122
published_at 2026-04-13T12:55:00Z
7
value 0.03252
scoring_system epss
scoring_elements 0.87127
published_at 2026-04-12T12:55:00Z
8
value 0.03252
scoring_system epss
scoring_elements 0.87133
published_at 2026-04-11T12:55:00Z
9
value 0.03252
scoring_system epss
scoring_elements 0.87119
published_at 2026-04-09T12:55:00Z
10
value 0.03252
scoring_system epss
scoring_elements 0.87112
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46242
1
reference_url https://github.com/xwiki/xwiki-platform
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/xwiki/xwiki-platform
2
reference_url https://github.com/xwiki/xwiki-platform/commit/cf8eb861998ea423c3645d2e5e974420b0e882be
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value 9.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-04T16:19:57Z/
url https://github.com/xwiki/xwiki-platform/commit/cf8eb861998ea423c3645d2e5e974420b0e882be
3
reference_url https://jira.xwiki.org/browse/XWIKI-20386
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value 9.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-04T16:19:57Z/
url https://jira.xwiki.org/browse/XWIKI-20386
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-46242
reference_id CVE-2023-46242
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-46242
5
reference_url https://github.com/advisories/GHSA-hgpw-6p4h-j6h5
reference_id GHSA-hgpw-6p4h-j6h5
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hgpw-6p4h-j6h5
6
reference_url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hgpw-6p4h-j6h5
reference_id GHSA-hgpw-6p4h-j6h5
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value 9.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
3
value CRITICAL
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-04T16:19:57Z/
url https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hgpw-6p4h-j6h5
Weaknesses
0
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
1
cwe_id 352
name Cross-Site Request Forgery (CSRF)
description The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
3
cwe_id 94
name Improper Control of Generation of Code ('Code Injection')
description The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Exploits
Severity_range_score9.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-kx6s-546m-gkdv