XWiki Platform is a generic wiki platform. Starting in version 3.2-m3, users can deduce the content of the password fields by repeated call to `LiveTableResults` and `WikisLiveTableResultsMacros`. The issue can be fixed by upgrading to versions 14.7-rc-1, 13.4.4, or 13.10.9 and higher, or in version >= 3.2M3 by applying the patch manually on `LiveTableResults` and `WikisLiveTableResultsMacros`.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-0882 XWiki Platform is a generic wiki platform. Starting in version 3.2-m3, users can deduce the content of the password fields by repeated call to `LiveTableResults` and `WikisLiveTableResultsMacros`. The issue can be fixed by upgrading to versions 14.7-rc-1, 13.4.4, or 13.10.9 and higher, or in version >= 3.2M3 by applying the patch manually on `LiveTableResults` and `WikisLiveTableResultsMacros`.
Github GHSA Github GHSA GHSA-5cf8-vrr8-8hjm XWiki Platform packages Expose Sensitive Information to an Unauthorized Actor
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 05 Mar 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-03-05T21:24:50.665Z

Reserved: 2023-02-23T23:22:58.573Z

Link: CVE-2023-26476

cve-icon Vulnrichment

Updated: 2024-08-02T11:53:52.948Z

cve-icon NVD

Status : Modified

Published: 2023-03-02T19:15:11.567

Modified: 2024-11-21T07:51:35.463

Link: CVE-2023-26476

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.