{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T20:34:22.125","vulnerabilities":[{"cve":{"id":"CVE-2023-47320","sourceIdentifier":"cve@mitre.org","published":"2023-12-13T14:15:44.153","lastModified":"2025-05-22T19:15:36.600","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Silverpeas Core 6.3.1 is vulnerable to Incorrect Access Control. An attacker with low privileges is able to execute the administrator-only function of putting the application in \"Maintenance Mode\" due to broken access control. This makes the application unavailable to all users. This affects Silverpeas Core 6.3.1 and below."},{"lang":"es","value":"Silverpeas Core 6.3.1 es vulnerable a un control de acceso incorrecto. Un atacante con pocos privilegios puede ejecutar la función exclusiva de administrador de poner la aplicación en \"Modo de mantenimiento\" debido a un control de acceso roto. Esto hace que la aplicación no esté disponible para todos los usuarios. Esto afecta a Silverpeas Core 6.3.1 y versiones anteriores."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:silverpeas:silverpeas:*:*:*:*:*:*:*:*","versionEndExcluding":"6.3.2","matchCriteriaId":"F4C6E996-03CD-4BD3-A74F-A450CA1B0C0B"}]}]}],"references":[{"url":"http://silverpeas.com","source":"cve@mitre.org","tags":["Product"]},{"url":"https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47320","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"http://silverpeas.com","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47320","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}