Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-3ksc-nvrc-6ub3
Vulnerability ID VCID-3ksc-nvrc-6ub3
Aliases CVE-2023-40572
GHSA-4f8m-7h83-9f6m
Summary Cross-Site Request Forgery (CSRF) XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The create action is vulnerable to a CSRF attack, allowing script and thus remote code execution when targeting a user with script/programming right, thus compromising the confidentiality, integrity and availability of the whole XWiki installation. When a user with script right views this image and a log message `ERROR foo - Script executed!` appears in the log, the XWiki installation is vulnerable. This has been patched in XWiki 14.10.9 and 15.4RC1 by requiring a CSRF token for the actual page creation.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.01802 https://api.first.org/data/v1/epss?cve=CVE-2023-40572
epss 0.01802 https://api.first.org/data/v1/epss?cve=CVE-2023-40572
epss 0.01802 https://api.first.org/data/v1/epss?cve=CVE-2023-40572
epss 0.01802 https://api.first.org/data/v1/epss?cve=CVE-2023-40572
epss 0.01802 https://api.first.org/data/v1/epss?cve=CVE-2023-40572
epss 0.01802 https://api.first.org/data/v1/epss?cve=CVE-2023-40572
epss 0.01802 https://api.first.org/data/v1/epss?cve=CVE-2023-40572
epss 0.01802 https://api.first.org/data/v1/epss?cve=CVE-2023-40572
epss 0.01802 https://api.first.org/data/v1/epss?cve=CVE-2023-40572
epss 0.01802 https://api.first.org/data/v1/epss?cve=CVE-2023-40572
epss 0.01802 https://api.first.org/data/v1/epss?cve=CVE-2023-40572
epss 0.01802 https://api.first.org/data/v1/epss?cve=CVE-2023-40572
epss 0.01802 https://api.first.org/data/v1/epss?cve=CVE-2023-40572
epss 0.01802 https://api.first.org/data/v1/epss?cve=CVE-2023-40572
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-4f8m-7h83-9f6m
cvssv3.1 8.0 https://github.com/xwiki/xwiki-platform
generic_textual HIGH https://github.com/xwiki/xwiki-platform
cvssv3.1 8.0 https://github.com/xwiki/xwiki-platform/commit/123e5d7e4ca06bf75b95aaef665aafc4fa9cae64
generic_textual HIGH https://github.com/xwiki/xwiki-platform/commit/123e5d7e4ca06bf75b95aaef665aafc4fa9cae64
cvssv3.1 8.0 https://github.com/xwiki/xwiki-platform/commit/4b20528808d0c311290b0d9ab2cfc44063380ef7
generic_textual HIGH https://github.com/xwiki/xwiki-platform/commit/4b20528808d0c311290b0d9ab2cfc44063380ef7
cvssv3.1 8.0 https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8m-7h83-9f6m
cvssv3.1_qr HIGH https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8m-7h83-9f6m
generic_textual HIGH https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8m-7h83-9f6m
cvssv3.1 8.0 https://jira.xwiki.org/browse/XWIKI-20849
generic_textual HIGH https://jira.xwiki.org/browse/XWIKI-20849
cvssv3.1 8.0 https://nvd.nist.gov/vuln/detail/CVE-2023-40572
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2023-40572
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/xwiki/xwiki-platform
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/xwiki/xwiki-platform/commit/123e5d7e4ca06bf75b95aaef665aafc4fa9cae64
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/xwiki/xwiki-platform/commit/4b20528808d0c311290b0d9ab2cfc44063380ef7
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8m-7h83-9f6m
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://jira.xwiki.org/browse/XWIKI-20849
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-40572
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.82747
EPSS Score 0.01802
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:51:43.727240+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.xwiki.platform/xwiki-platform-oldcore/CVE-2023-40572.yml 38.0.0