Search for packages
| purl | pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@10.11.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-vqgg-gxsf-tqh1
Aliases: CVE-2023-29526 GHSA-gpq5-7p34-vqx5 |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to display or interact with any page a user cannot access through the combination of the async and display macros. A comment with either macro will be executed when viewed providing a code injection vector in the context of the running server. This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this issue. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-02T16:59:23.278970+00:00 | GHSA Importer | Affected by | VCID-vqgg-gxsf-tqh1 | https://github.com/advisories/GHSA-gpq5-7p34-vqx5 | 38.1.0 |
| 2026-04-01T12:51:11.069454+00:00 | GitLab Importer | Affected by | VCID-vqgg-gxsf-tqh1 | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.xwiki.platform/xwiki-platform-oldcore/CVE-2023-29526.yml | 38.0.0 |