Search for packages
| purl | pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-4mj5-repk-zyg2
Aliases: CVE-2024-37898 GHSA-33gp-gmg3-hfpq |
XWiki Platform vulnerable to document deletion and overwrite from edit ### Impact When a user has edit but not view right on a page in XWiki, that user can delete the page and replace it by a page with new content without having delete right. The previous version of the page is moved into the recycle bin and can be restored from there by an admin. As the user is recorded as deleter, the user would in theory also be able to view the deleted content, but this is not directly possible as rights of the previous version are transferred to the new page and thus the user still doesn't have view right on the page. From all we examined, it therefore doesn't seem to be possible to exploit this to gain any rights. To reproduce, just replace `view` by `edit` in the URL of a page that you cannot view but edit and save. This should send the page to the recycle bin and replace it by an empty one if the XWiki installation is vulnerable. After the fix, an error is displayed when saving. ### Patches This has been patched in XWiki 14.10.21, 15.5.5 and 15.10.6 by cancelling save operations by users when a new document shall be saved despite the document's existing already. ### Workarounds We're not aware of any workarounds. ### References * https://jira.xwiki.org/browse/XWIKI-21553 * https://github.com/xwiki/xwiki-platform/commit/c5efc1e519e710afdf3c5f40c0fcc300ad77149f |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-f9gd-r31y-dycc | XWiki Platform Old Core vulnerable to Authentication Bypass Using the Login Action ### Impact All rights checks that would normally prevent a user from viewing a document on a wiki can be bypassed using the login action and directly specified templates. This exposes title, content and comments of any document and properties of objects (class and property name must be known, though). This is also exploitable on [private wikis](https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Access%20Rights/#HPrivateWiki). ### Patches This has been patched in versions 14.2 and 13.10.4 by properly checking view rights before loading documents and disallowing non-default templates in the login, registration and skin action. ### Workarounds It would be possible to protect all templates individually by adding code to check access rights first, but due to the number of templates and the fact that some of them need to be used without view rights, this seems impractical. ### References * https://jira.xwiki.org/browse/XWIKI-19549 * https://jira.xwiki.org/browse/XWIKI-18602 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [security mailing-list](mailto:security@xwiki.com) |
CVE-2022-36092
GHSA-8h89-34w2-jpfm |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-03T21:27:40.337118+00:00 | GitLab Importer | Fixing | VCID-f9gd-r31y-dycc | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.xwiki.platform/xwiki-platform-oldcore/CVE-2022-36092.yml | 38.1.0 |
| 2026-04-01T16:06:06.564764+00:00 | GHSA Importer | Affected by | VCID-4mj5-repk-zyg2 | https://github.com/advisories/GHSA-33gp-gmg3-hfpq | 38.0.0 |
| 2026-04-01T16:03:09.884108+00:00 | GHSA Importer | Fixing | VCID-f9gd-r31y-dycc | https://github.com/advisories/GHSA-8h89-34w2-jpfm | 38.0.0 |
| 2026-04-01T13:05:36.000777+00:00 | GithubOSV Importer | Fixing | VCID-f9gd-r31y-dycc | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-8h89-34w2-jpfm/GHSA-8h89-34w2-jpfm.json | 38.0.0 |