Lookup for vulnerable packages by Package URL.

GET /api/packages/58497?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/58497?format=api",
    "purl": "pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.2-rc-1",
    "type": "maven",
    "namespace": "org.xwiki.platform",
    "name": "xwiki-platform-oldcore",
    "version": "15.2-rc-1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "15.3-rc-1",
    "latest_non_vulnerable_version": "17.10.1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/19705?format=api",
            "vulnerability_id": "VCID-4czm-tywp-h3er",
            "summary": "XWiki Platform vulnerable to privilege escalation and remote code execution via the edit action\nXWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible for a user to execute any content with the right of an existing document's content author, provided the user have edit right on it. A crafted URL of the form ` /xwiki/bin/edit//?content=%7B%7Bgroovy%7D%7Dprintln%28%22Hello+from+ Groovy%21%22%29%7B%7B%2Fgroovy%7D%7D&xpage=view` can be used to execute arbitrary groovy code on the server. This vulnerability has been patched in XWiki versions 14.10.6 and 15.2RC1. Users are advised to update. There are no known workarounds for this issue.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91764",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91777",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91757",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91814",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.07479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91801",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.07479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91804",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91798",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91797",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91805",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.07479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91785",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91789",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91787",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91751",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07479",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91784",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46243"
                },
                {
                    "reference_url": "https://github.com/xwiki/xwiki-platform",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/xwiki/xwiki-platform"
                },
                {
                    "reference_url": "https://github.com/xwiki/xwiki-platform/commit/a0e6ca083b36be6f183b9af33ae735c1e02010f4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-04T15:50:55Z/"
                        }
                    ],
                    "url": "https://github.com/xwiki/xwiki-platform/commit/a0e6ca083b36be6f183b9af33ae735c1e02010f4"
                },
                {
                    "reference_url": "https://jira.xwiki.org/browse/XWIKI-20385",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-04T15:50:55Z/"
                        }
                    ],
                    "url": "https://jira.xwiki.org/browse/XWIKI-20385"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46243",
                    "reference_id": "CVE-2023-46243",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46243"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-g2qq-c5j9-5w5w",
                    "reference_id": "GHSA-g2qq-c5j9-5w5w",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-g2qq-c5j9-5w5w"
                },
                {
                    "reference_url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g2qq-c5j9-5w5w",
                    "reference_id": "GHSA-g2qq-c5j9-5w5w",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-04T15:50:55Z/"
                        }
                    ],
                    "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g2qq-c5j9-5w5w"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/58376?format=api",
                    "purl": "pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/58497?format=api",
                    "purl": "pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.2-rc-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.2-rc-1"
                }
            ],
            "aliases": [
                "CVE-2023-46243",
                "GHSA-g2qq-c5j9-5w5w"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4czm-tywp-h3er"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/18140?format=api",
            "vulnerability_id": "VCID-6keh-puhm-6kc7",
            "summary": "Incomplete Cleanup\nXWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. When an XWiki installation is upgraded and that upgrade contains a fix for a bug in a document, just a new version of that document is added. In some cases, it's still possible to exploit the vulnerability that was fixed in the new version. The severity of this depends on the fixed vulnerability, for the purpose of this advisory take CVE-2022-36100/GHSA-2g5c-228j-p52x as example - it is easily exploitable with just view rights and critical. When XWiki is upgraded from a version before the fix for it (e.g., 14.3) to a version including the fix (e.g., 14.4), the vulnerability can still be reproduced by adding `rev=1.1` to the URL used in the reproduction steps so remote code execution is possible even after upgrading. Therefore, this affects the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability also affects manually added script macros that contained security vulnerabilities that were later fixed by changing the script macro without deleting the versions with the security vulnerability from the history. This vulnerability does not affect freshly installed versions of XWiki. Further, this vulnerability does not affect content that is only loaded from the current version of a document like the code of wiki macros or UI extensions. This vulnerability has been patched in XWiki 14.10.7 and 15.2RC1 by forcing old revisions to be executed in a restricted mode that disables all script macros. As a workaround, admins can manually delete old revisions of affected documents. A script could be used to identify all installed documents and delete the history for them. However, also manually added and later corrected code may be affected by this vulnerability so it is easy to miss documents.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-36468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.09239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92745",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.09239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92736",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.09239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92741",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.10584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.933",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.10584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93295",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.10584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93276",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.10584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93278",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93275",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9327",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93261",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93257",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93312",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.10584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93307",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.10584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93262",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-36468"
                },
                {
                    "reference_url": "https://github.com/xwiki/xwiki-platform",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/xwiki/xwiki-platform"
                },
                {
                    "reference_url": "https://github.com/xwiki/xwiki-platform/commit/15a6f845d8206b0ae97f37aa092ca43d4f9d6e59",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-26T19:13:09Z/"
                        }
                    ],
                    "url": "https://github.com/xwiki/xwiki-platform/commit/15a6f845d8206b0ae97f37aa092ca43d4f9d6e59"
                },
                {
                    "reference_url": "https://jira.xwiki.org/browse/XWIKI-20594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-26T19:13:09Z/"
                        }
                    ],
                    "url": "https://jira.xwiki.org/browse/XWIKI-20594"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36468",
                    "reference_id": "CVE-2023-36468",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36468"
                },
                {
                    "reference_url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2g5c-228j-p52x",
                    "reference_id": "GHSA-2g5c-228j-p52x",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-26T19:13:09Z/"
                        }
                    ],
                    "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2g5c-228j-p52x"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-8q9q-r9v2-644m",
                    "reference_id": "GHSA-8q9q-r9v2-644m",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-8q9q-r9v2-644m"
                },
                {
                    "reference_url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8q9q-r9v2-644m",
                    "reference_id": "GHSA-8q9q-r9v2-644m",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-26T19:13:09Z/"
                        }
                    ],
                    "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8q9q-r9v2-644m"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/58496?format=api",
                    "purl": "pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.7",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/58497?format=api",
                    "purl": "pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.2-rc-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.2-rc-1"
                }
            ],
            "aliases": [
                "CVE-2023-36468",
                "GHSA-8q9q-r9v2-644m"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6keh-puhm-6kc7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/19707?format=api",
            "vulnerability_id": "VCID-kx6s-546m-gkdv",
            "summary": "Cross-Site Request Forgery (CSRF)\nXWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to execute a content with the right of any user via a crafted URL. A user must have `programming` privileges in order to exploit this vulnerability. This issue has been patched in XWiki 14.10.7 and 15.2RC1. Users are advised to upgrade. There are no known workarounds for for this vulnerability.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46242",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87092",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87112",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87098",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87186",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87166",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87165",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87159",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8714",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87143",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87139",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87122",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87127",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8708",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87133",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87119",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46242"
                },
                {
                    "reference_url": "https://github.com/xwiki/xwiki-platform",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/xwiki/xwiki-platform"
                },
                {
                    "reference_url": "https://github.com/xwiki/xwiki-platform/commit/cf8eb861998ea423c3645d2e5e974420b0e882be",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-04T16:19:57Z/"
                        }
                    ],
                    "url": "https://github.com/xwiki/xwiki-platform/commit/cf8eb861998ea423c3645d2e5e974420b0e882be"
                },
                {
                    "reference_url": "https://jira.xwiki.org/browse/XWIKI-20386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-04T16:19:57Z/"
                        }
                    ],
                    "url": "https://jira.xwiki.org/browse/XWIKI-20386"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46242",
                    "reference_id": "CVE-2023-46242",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46242"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-hgpw-6p4h-j6h5",
                    "reference_id": "GHSA-hgpw-6p4h-j6h5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-hgpw-6p4h-j6h5"
                },
                {
                    "reference_url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hgpw-6p4h-j6h5",
                    "reference_id": "GHSA-hgpw-6p4h-j6h5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-04T16:19:57Z/"
                        }
                    ],
                    "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hgpw-6p4h-j6h5"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/58496?format=api",
                    "purl": "pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.7",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@14.10.7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/58497?format=api",
                    "purl": "pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.2-rc-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.2-rc-1"
                }
            ],
            "aliases": [
                "CVE-2023-46242",
                "GHSA-hgpw-6p4h-j6h5"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kx6s-546m-gkdv"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-oldcore@15.2-rc-1"
}