Vulnerability Details : CVE-2023-35151
XWiki Platform is a generic wiki platform. Starting in version 7.3-milestone-1 and prior to versions 14.4.8, 14.10.6, and 15.1, ny user can call a REST endpoint and obtain the obfuscated passwords, even when the mail obfuscation is activated. The issue has been patched in XWiki 14.4.8, 14.10.6, and 15.1. There is no known workaround.
Products affected by CVE-2023-35151
- cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
- cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
- cpe:2.3:a:xwiki:xwiki:15.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:xwiki:xwiki:15.0:*:*:*:*:*:*:*
- cpe:2.3:a:xwiki:xwiki:7.3:milestone1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-35151
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-35151
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2023-35151
-
The product does not properly prevent a person's private, personal information from being accessed by actors who either (1) are not explicitly authorized to access the information or (2) do not have the implicit consent of the person about whom the information is collected.Assigned by: security-advisories@github.com (Secondary)
-
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-35151
-
https://github.com/xwiki/xwiki-platform/commit/824cd742ecf5439971247da11bfe7e0ad2b10ede
XWIKI-16138: Improved REST properties cleanup · xwiki/xwiki-platform@824cd74 · GitHubPatch;Vendor Advisory
-
https://jira.xwiki.org/browse/XWIKI-16138
[XWIKI-16138] Email addresses are shown in clear in REST results - XWiki.org JIRAIssue Tracking;Vendor Advisory
-
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8g9c-c9cm-9c56
Email addresses are shown in clear in REST results · Advisory · xwiki/xwiki-platform · GitHubVendor Advisory
Jump to