Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-mgyt-2kx1-9yfz
Vulnerability ID VCID-mgyt-2kx1-9yfz
Aliases CVE-2023-26474
GHSA-3738-p9x3-mv9r
Summary XWiki Platform vulnerable to privilege escalation via properties with wiki syntax that are executed with wrong author XWiki Platform is a generic wiki platform. Starting in version 13.10, it's possible to use the right of an existing document content author to execute a text area property. This has been patched in XWiki 14.10, 14.4.7, and 13.10.11. There are no known workarounds.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.02071 https://api.first.org/data/v1/epss?cve=CVE-2023-26474
epss 0.02071 https://api.first.org/data/v1/epss?cve=CVE-2023-26474
epss 0.02071 https://api.first.org/data/v1/epss?cve=CVE-2023-26474
epss 0.02071 https://api.first.org/data/v1/epss?cve=CVE-2023-26474
epss 0.02071 https://api.first.org/data/v1/epss?cve=CVE-2023-26474
epss 0.02071 https://api.first.org/data/v1/epss?cve=CVE-2023-26474
epss 0.02071 https://api.first.org/data/v1/epss?cve=CVE-2023-26474
epss 0.02071 https://api.first.org/data/v1/epss?cve=CVE-2023-26474
epss 0.02071 https://api.first.org/data/v1/epss?cve=CVE-2023-26474
epss 0.02071 https://api.first.org/data/v1/epss?cve=CVE-2023-26474
epss 0.02071 https://api.first.org/data/v1/epss?cve=CVE-2023-26474
epss 0.02071 https://api.first.org/data/v1/epss?cve=CVE-2023-26474
epss 0.02071 https://api.first.org/data/v1/epss?cve=CVE-2023-26474
epss 0.02071 https://api.first.org/data/v1/epss?cve=CVE-2023-26474
epss 0.02071 https://api.first.org/data/v1/epss?cve=CVE-2023-26474
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-3738-p9x3-mv9r
cvssv3.1 9.9 https://github.com/xwiki/xwiki-platform
generic_textual CRITICAL https://github.com/xwiki/xwiki-platform
cvssv3.1 10 https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r
cvssv3.1 9.9 https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r
cvssv3.1_qr CRITICAL https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r
generic_textual CRITICAL https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r
ssvc Track https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r
cvssv3.1 10 https://jira.xwiki.org/browse/XWIKI-20373
cvssv3.1 9.9 https://jira.xwiki.org/browse/XWIKI-20373
generic_textual CRITICAL https://jira.xwiki.org/browse/XWIKI-20373
ssvc Track https://jira.xwiki.org/browse/XWIKI-20373
cvssv3.1 9.9 https://nvd.nist.gov/vuln/detail/CVE-2023-26474
generic_textual CRITICAL https://nvd.nist.gov/vuln/detail/CVE-2023-26474
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Found at https://github.com/xwiki/xwiki-platform
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Found at https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Found at https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T21:21:46Z/ Found at https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Found at https://jira.xwiki.org/browse/XWIKI-20373
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Found at https://jira.xwiki.org/browse/XWIKI-20373
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T21:21:46Z/ Found at https://jira.xwiki.org/browse/XWIKI-20373
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-26474
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.83894
EPSS Score 0.02071
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:50:57.785864+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.xwiki.platform/xwiki-platform-legacy-oldcore/CVE-2023-26474.yml 38.0.0