Vulnerability Description
XWiki Platform is a generic wiki platform. Starting in version 3.2-m3, users can deduce the content of the password fields by repeated call to `LiveTableResults` and `WikisLiveTableResultsMacros`. The issue can be fixed by upgrading to versions 14.7-rc-1, 13.4.4, or 13.10.9 and higher, or in version >= 3.2M3 by applying the patch manually on `LiveTableResults` and `WikisLiveTableResultsMacros`.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xwiki | Xwiki | >= 3.3, < 13.4.4 |
Related Weaknesses (CWE)
References
- https://github.com/xwiki/xwiki-platform/commit/7f8825537c9523ccb5051abd78014d156Patch
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5cf8-vrr8-8hjmVendor Advisory
- https://jira.xwiki.org/browse/XWIKI-19949ExploitIssue TrackingPatch
- https://github.com/xwiki/xwiki-platform/commit/7f8825537c9523ccb5051abd78014d156Patch
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5cf8-vrr8-8hjmVendor Advisory
- https://jira.xwiki.org/browse/XWIKI-19949ExploitIssue TrackingPatch
FAQ
What is CVE-2023-26476?
CVE-2023-26476 is a vulnerability with a CVSS score of 7.5 (HIGH). XWiki Platform is a generic wiki platform. Starting in version 3.2-m3, users can deduce the content of the password fields by repeated call to `LiveTableResults` and `WikisLiveTableResultsMacros`. The...
How severe is CVE-2023-26476?
CVE-2023-26476 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-26476?
Check the references section above for vendor advisories and patch information. Affected products include: Xwiki Xwiki.