Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.0
purl pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.0
Next non-vulnerable version 15.1-rc-1
Latest non-vulnerable version 17.10.1
Risk 4.5
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-4czm-tywp-h3er
Aliases:
CVE-2023-46243
GHSA-g2qq-c5j9-5w5w
XWiki Platform vulnerable to privilege escalation and remote code execution via the edit action XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible for a user to execute any content with the right of an existing document's content author, provided the user have edit right on it. A crafted URL of the form ` /xwiki/bin/edit//?content=%7B%7Bgroovy%7D%7Dprintln%28%22Hello+from+ Groovy%21%22%29%7B%7B%2Fgroovy%7D%7D&xpage=view` can be used to execute arbitrary groovy code on the server. This vulnerability has been patched in XWiki versions 14.10.6 and 15.2RC1. Users are advised to update. There are no known workarounds for this issue.
15.2-rc-1
Affected by 0 other vulnerabilities.
VCID-4mj5-repk-zyg2
Aliases:
CVE-2024-37898
GHSA-33gp-gmg3-hfpq
XWiki Platform vulnerable to document deletion and overwrite from edit ### Impact When a user has edit but not view right on a page in XWiki, that user can delete the page and replace it by a page with new content without having delete right. The previous version of the page is moved into the recycle bin and can be restored from there by an admin. As the user is recorded as deleter, the user would in theory also be able to view the deleted content, but this is not directly possible as rights of the previous version are transferred to the new page and thus the user still doesn't have view right on the page. From all we examined, it therefore doesn't seem to be possible to exploit this to gain any rights. To reproduce, just replace `view` by `edit` in the URL of a page that you cannot view but edit and save. This should send the page to the recycle bin and replace it by an empty one if the XWiki installation is vulnerable. After the fix, an error is displayed when saving. ### Patches This has been patched in XWiki 14.10.21, 15.5.5 and 15.10.6 by cancelling save operations by users when a new document shall be saved despite the document's existing already. ### Workarounds We're not aware of any workarounds. ### References * https://jira.xwiki.org/browse/XWIKI-21553 * https://github.com/xwiki/xwiki-platform/commit/c5efc1e519e710afdf3c5f40c0fcc300ad77149f
15.5.5
Affected by 0 other vulnerabilities.
15.10.6
Affected by 0 other vulnerabilities.
VCID-kx6s-546m-gkdv
Aliases:
CVE-2023-46242
GHSA-hgpw-6p4h-j6h5
Cross-Site Request Forgery (CSRF) XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to execute a content with the right of any user via a crafted URL. A user must have `programming` privileges in order to exploit this vulnerability. This issue has been patched in XWiki 14.10.7 and 15.2RC1. Users are advised to upgrade. There are no known workarounds for for this vulnerability.
15.2-rc-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-02T17:00:38.994935+00:00 GHSA Importer Affected by VCID-4czm-tywp-h3er https://github.com/advisories/GHSA-g2qq-c5j9-5w5w 38.1.0
2026-04-02T17:00:38.935729+00:00 GHSA Importer Affected by VCID-kx6s-546m-gkdv https://github.com/advisories/GHSA-hgpw-6p4h-j6h5 38.1.0
2026-04-01T16:06:06.667880+00:00 GHSA Importer Affected by VCID-4mj5-repk-zyg2 https://github.com/advisories/GHSA-33gp-gmg3-hfpq 38.0.0
2026-04-01T12:52:04.597000+00:00 GitLab Importer Affected by VCID-kx6s-546m-gkdv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.xwiki.platform/xwiki-platform-oldcore/CVE-2023-46242.yml 38.0.0
2026-04-01T12:52:04.568466+00:00 GitLab Importer Affected by VCID-4czm-tywp-h3er https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.xwiki.platform/xwiki-platform-oldcore/CVE-2023-46243.yml 38.0.0