Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.0-rc-1
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.0-rc-1
Next non-vulnerable version 14.2-rc-1
Latest non-vulnerable version 17.10.1
Risk 4.5
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-dnqk-983h-u3et
Aliases:
CVE-2022-31166
GHSA-g4h6-qp44-wqvx
XWiki.WebHome vulnerable to Improper Privilege Management in XWiki resolving groups ### Impact It's possible to exploit a bug in XWikiRights resolution of groups to obtain privilege escalation. More specifically, editing a right with the object editor leads to adding a supplementary empty value to groups which is then resolved as a reference to XWiki.WebHome page. Adding an XWikiGroup xobject to that page then transforms it to a group, any user put in that group would then obtain the privileges related to the edited right. Note that this security issue is normally mitigated by the fact that XWiki.WebHome (and XWiki space in general) should be protected by default for edit rights. ### Patches The problem has been patched in XWiki 13.10.4 and 14.2RC1 to not consider anymore empty values in XWikiRights. ### Workarounds It's possible to workaround the problem by setting appropriate rights on XWiki.WebHome page to prevent users to edit it. ### References * https://jira.xwiki.org/browse/XWIKI-18386 * https://jira.xwiki.org/browse/XWIKI-15776 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org) * Email us at [Security Mailing List](mailto:security@xwiki.org)
14.2-rc-1
Affected by 0 other vulnerabilities.
VCID-gxbk-2r83-kbav
Aliases:
CVE-2023-29204
GHSA-xwph-x6xj-wggv
org.xwiki.platform:xwiki-platform-oldcore Open Redirect vulnerability ### Impact It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. ### Patches The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1. ### Workarounds The only way to workaround the bug is by providing a patched jar of xwiki-platform-oldcore containing the following changes: https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e#diff-c445f288d5d63424f56ef13f65514ab4e174a72e979b53b88197c2b7def267cf. ### References * Jira ticket of the reported vulnerability: https://jira.xwiki.org/browse/XWIKI-19994 * Jira ticket of the original mechanism put in place to prevent open redirect: https://jira.xwiki.org/browse/XWIKI-10309 * Original advisory about open redirect: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](https://jira.xwiki.org) * Email us at [Security ML](mailto:security@xwiki.org)
14.4.4
Affected by 0 other vulnerabilities.
14.8-rc-1
Affected by 0 other vulnerabilities.
VCID-mpyn-zkgb-mfe8
Aliases:
CVE-2023-29523
GHSA-x764-ff8r-9hpx
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can edit their own user profile can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The same vulnerability can also be exploited in other contexts where the `display` method on a document is used to display a field with wiki syntax, for example in applications created using `App Within Minutes`. This has been patched in XWiki 13.10.11, 14.4.8, 14.10.2 and 15.0RC1. There is no workaround apart from upgrading.
14.4.8
Affected by 0 other vulnerabilities.
14.10.2
Affected by 0 other vulnerabilities.
VCID-vqgg-gxsf-tqh1
Aliases:
CVE-2023-29526
GHSA-gpq5-7p34-vqx5
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to display or interact with any page a user cannot access through the combination of the async and display macros. A comment with either macro will be executed when viewed providing a code injection vector in the context of the running server. This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this issue.
14.4.8
Affected by 0 other vulnerabilities.
14.10.3
Affected by 0 other vulnerabilities.
VCID-xms6-msad-wkgm
Aliases:
CVE-2023-29208
GHSA-4f8g-fq6x-jqrr
org.xwiki.platform:xwiki-platform-oldcore vulnerable to data leak through deleted documents ### Impact Rights added to a document are not taken into account for viewing it once it's deleted. Note that this vulnerability only impact deleted documents that where containing view rights: the view rights provided on a space of a deleted document are properly checked. ### Patches The problem has been patched in XWiki 14.10 by checking the rights of current user: only admin and deleter of the document are allowed to view it. ### Workarounds There is no workaround for this vulnerability other than upgrading. ### References * Jira ticket: https://jira.xwiki.org/browse/XWIKI-16285 * Commit: https://github.com/xwiki/xwiki-platform/commit/d9e947559077e947315bf700c5703dfc7dd8a8d7 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](https://jira.xwiki.org) * Email us at [security ML](mailto:security@xwiki.org)
14.4.7
Affected by 0 other vulnerabilities.
14.10
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-3gd6-stuu-qkha XWiki Platform subject to Uncontrolled Resource Consumption XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to make the farm unusable by adding an object to a page with a huge number (e.g. 67108863). Most of the time this will fill the memory allocated to XWiki and make it unusable every time this document is manipulated. This issue has been patched in XWiki 14.0-rc-1. CVE-2023-26470
GHSA-92wp-r7hm-42g7

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-03T21:27:50.319410+00:00 GitLab Importer Affected by VCID-dnqk-983h-u3et https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.xwiki.platform/xwiki-platform-oldcore/CVE-2022-31166.yml 38.1.0
2026-04-02T16:59:23.308303+00:00 GHSA Importer Affected by VCID-vqgg-gxsf-tqh1 https://github.com/advisories/GHSA-gpq5-7p34-vqx5 38.1.0
2026-04-02T16:59:23.192468+00:00 GHSA Importer Affected by VCID-mpyn-zkgb-mfe8 https://github.com/advisories/GHSA-x764-ff8r-9hpx 38.1.0
2026-04-02T16:59:19.219936+00:00 GHSA Importer Affected by VCID-gxbk-2r83-kbav https://github.com/advisories/GHSA-xwph-x6xj-wggv 38.1.0
2026-04-02T16:59:18.099236+00:00 GHSA Importer Affected by VCID-xms6-msad-wkgm https://github.com/advisories/GHSA-4f8g-fq6x-jqrr 38.1.0
2026-04-02T16:59:03.256641+00:00 GHSA Importer Fixing VCID-3gd6-stuu-qkha https://github.com/advisories/GHSA-92wp-r7hm-42g7 38.1.0
2026-04-01T16:03:28.682326+00:00 GHSA Importer Affected by VCID-dnqk-983h-u3et https://github.com/advisories/GHSA-g4h6-qp44-wqvx 38.0.0
2026-04-01T12:58:32.540510+00:00 GithubOSV Importer Fixing VCID-3gd6-stuu-qkha https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-92wp-r7hm-42g7/GHSA-92wp-r7hm-42g7.json 38.0.0
2026-04-01T12:51:11.157808+00:00 GitLab Importer Affected by VCID-mpyn-zkgb-mfe8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.xwiki.platform/xwiki-platform-oldcore/CVE-2023-29523.yml 38.0.0
2026-04-01T12:51:11.071530+00:00 GitLab Importer Affected by VCID-vqgg-gxsf-tqh1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.xwiki.platform/xwiki-platform-oldcore/CVE-2023-29526.yml 38.0.0
2026-04-01T12:51:08.889121+00:00 GitLab Importer Affected by VCID-xms6-msad-wkgm https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.xwiki.platform/xwiki-platform-oldcore/CVE-2023-29208.yml 38.0.0
2026-04-01T12:51:08.569627+00:00 GitLab Importer Affected by VCID-gxbk-2r83-kbav https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.xwiki.platform/xwiki-platform-oldcore/CVE-2023-29204.yml 38.0.0
2026-04-01T12:50:58.198094+00:00 GitLab Importer Fixing VCID-3gd6-stuu-qkha https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.xwiki.platform/xwiki-platform-oldcore/CVE-2023-26470.yml 38.0.0