CVE-2023-26476

Source
https://cve.org/CVERecord?id=CVE-2023-26476
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-26476.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-26476
Aliases
Published
2023-03-02T18:02:20.328Z
Modified
2026-03-20T12:23:47.782205Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Two XWiki Platform UIs Expose Sensitive Information to an Unauthorized Actor
Details

XWiki Platform is a generic wiki platform. Starting in version 3.2-m3, users can deduce the content of the password fields by repeated call to LiveTableResults and WikisLiveTableResultsMacros. The issue can be fixed by upgrading to versions 14.7-rc-1, 13.4.4, or 13.10.9 and higher, or in version >= 3.2M3 by applying the patch manually on LiveTableResults and WikisLiveTableResultsMacros.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/26xxx/CVE-2023-26476.json",
    "cwe_ids": [
        "CWE-200"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/xwiki/xwiki-platform

Affected ranges

Type
GIT
Repo
https://github.com/xwiki/xwiki-platform
Events
Database specific
{
    "versions": [
        {
            "introduced": "3.2-m3"
        },
        {
            "fixed": "13.4.4"
        }
    ]
}
Type
GIT
Repo
https://github.com/xwiki/xwiki-platform
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "13.5.0"
        },
        {
            "fixed": "13.10.9"
        },
        {
            "introduced": "14.0.0"
        },
        {
            "fixed": "14.7-rc-1"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-26476.json"