Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/16651?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16651?format=api", "vulnerability_id": "VCID-gx1c-g91h-w3fs", "summary": "XWiki Platform users may execute anything with superadmin right through comments and async macro\nXWiki Platform is a generic wiki platform. Starting in version 11.6-rc-1, comments are supposed to be executed with the right of superadmin but in restricted mode (anything dangerous is disabled), but the async macro does not take into account the restricted mode. This means that any user with comment right can use the async macro to make it execute any wiki content with the right of superadmin. This has been patched in XWiki 14.9, 14.4.6, and 13.10.10. The only known workaround consists of applying a patch and rebuilding and redeploying `org.xwiki.platform:xwiki-platform-rendering-async-macro`.", "aliases": [ { "alias": "CVE-2023-26471" }, { "alias": "GHSA-9cqm-5wf7-wcj7" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/56167?format=api", "purl": "pkg:maven/org.xwiki.platform/xwiki-platform-rendering-async-macro@13.10.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-rendering-async-macro@13.10.10" }, { "url": "http://public2.vulnerablecode.io/api/packages/56169?format=api", "purl": "pkg:maven/org.xwiki.platform/xwiki-platform-rendering-async-macro@14.4.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-rendering-async-macro@14.4.6" }, { "url": "http://public2.vulnerablecode.io/api/packages/56170?format=api", "purl": "pkg:maven/org.xwiki.platform/xwiki-platform-rendering-async-macro@14.9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-rendering-async-macro@14.9" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/56164?format=api", "purl": "pkg:maven/org.xwiki.platform/xwiki-platform-rendering-async-macro@11.6-rc-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gx1c-g91h-w3fs" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-rendering-async-macro@11.6-rc-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/56165?format=api", "purl": "pkg:maven/org.xwiki.platform/xwiki-platform-rendering-async-macro@14.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gx1c-g91h-w3fs" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-rendering-async-macro@14.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/56166?format=api", "purl": "pkg:maven/org.xwiki.platform/xwiki-platform-rendering-async-macro@14.5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gx1c-g91h-w3fs" }, { "vulnerability": "VCID-vqgg-gxsf-tqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.xwiki.platform/xwiki-platform-rendering-async-macro@14.5" } ], "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26471", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11049", "scoring_system": "epss", "scoring_elements": "0.93415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11049", "scoring_system": "epss", "scoring_elements": "0.93476", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.11049", "scoring_system": "epss", "scoring_elements": "0.93473", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.11049", "scoring_system": "epss", "scoring_elements": "0.93467", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11049", "scoring_system": "epss", "scoring_elements": "0.93462", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11049", "scoring_system": "epss", "scoring_elements": "0.93442", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11049", "scoring_system": "epss", "scoring_elements": "0.93441", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11049", "scoring_system": "epss", "scoring_elements": "0.93435", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11049", "scoring_system": "epss", "scoring_elements": "0.93432", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11049", "scoring_system": "epss", "scoring_elements": "0.93424", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11049", "scoring_system": "epss", "scoring_elements": "0.93423", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-26471" }, { "reference_url": "https://github.com/xwiki/xwiki-platform", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/xwiki/xwiki-platform" }, { "reference_url": "https://github.com/xwiki/xwiki-platform/commit/00532d9f1404287cf3ec3a05056640d809516006", "reference_id": "", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "9.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T19:53:58Z/" } ], "url": "https://github.com/xwiki/xwiki-platform/commit/00532d9f1404287cf3ec3a05056640d809516006" }, { "reference_url": "https://jira.xwiki.org/browse/XWIKI-20234", "reference_id": "", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "9.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T19:53:58Z/" } ], "url": "https://jira.xwiki.org/browse/XWIKI-20234" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26471", "reference_id": "CVE-2023-26471", "reference_type": "", "scores": [ { "value": "9.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26471" }, { "reference_url": "https://github.com/advisories/GHSA-9cqm-5wf7-wcj7", "reference_id": "GHSA-9cqm-5wf7-wcj7", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-9cqm-5wf7-wcj7" }, { "reference_url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9cqm-5wf7-wcj7", "reference_id": "GHSA-9cqm-5wf7-wcj7", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "9.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T19:53:58Z/" } ], "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9cqm-5wf7-wcj7" } ], "weaknesses": [ { "cwe_id": 1035, "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017." }, { "cwe_id": 937, "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013." }, { "cwe_id": 284, "name": "Improper Access Control", "description": "The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor." } ], "exploits": [], "severity_range_score": "9.0 - 10.0", "exploitability": "0.5", "weighted_severity": "9.0", "risk_score": 4.5, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gx1c-g91h-w3fs" }