{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T04:57:30.187","vulnerabilities":[{"cve":{"id":"CVE-2023-50719","sourceIdentifier":"security-advisories@github.com","published":"2023-12-15T19:15:09.247","lastModified":"2024-11-21T08:37:12.280","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"XWiki Platform is a generic wiki platform. Starting in 7.2-milestone-2 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the password hashes of all users to anyone with view right on the respective user profiles. By default, all user profiles are public. This vulnerability also affects any configurations used by extensions that contain passwords like API keys that are viewable for the attacker. Normally, such passwords aren't accessible but this vulnerability would disclose them as plain text.  This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1. There are no known workarounds for this vulnerability.\n"},{"lang":"es","value":"XWiki Platform es una plataforma wiki genérica. A partir de 7.2-milestone-2 y antes de las versiones 14.10.15, 15.5.2 y 15.7-rc-1, la búsqueda basada en Solr en XWiki revela los hashes de contraseñas de todos los usuarios a cualquier persona con acceso directo a los respectivos perfiles de usuario. De forma predeterminada, todos los perfiles de usuario son públicos. Esta vulnerabilidad también afecta cualquier configuración utilizada por extensiones que contengan contraseñas como claves API que sean visibles para el atacante. Normalmente, no se puede acceder a dichas contraseñas, pero esta vulnerabilidad las revelaría como texto plano. Esto ha sido parcheado en XWiki 14.10.15, 15.5.2 y 15.7RC1. No se conocen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"},{"lang":"en","value":"CWE-359"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-312"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*","versionStartIncluding":"7.3","versionEndExcluding":"14.10.5","matchCriteriaId":"3B63FE1F-306B-4F87-B6A3-6976E761D911"},{"vulnerable":true,"criteria":"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0","versionEndExcluding":"15.5.2","matchCriteriaId":"1EF6C37A-D19A-4179-8DBA-2573A61E73CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:xwiki:xwiki:7.2:milestone2:*:*:*:*:*:*","matchCriteriaId":"C2A06C6F-1DBA-4E6D-901A-096F16C08D49"},{"vulnerable":true,"criteria":"cpe:2.3:a:xwiki:xwiki:7.2:milestone3:*:*:*:*:*:*","matchCriteriaId":"470D146C-5EBF-4399-BF0C-26D9CC48DE0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:xwiki:xwiki:15.6:-:*:*:*:*:*:*","matchCriteriaId":"E0E3BBA4-5DBC-45F8-ACD2-1969FB3098FB"},{"vulnerable":true,"criteria":"cpe:2.3:a:xwiki:xwiki:15.6:rc1:*:*:*:*:*:*","matchCriteriaId":"96F8B723-5227-4590-8626-C9CF0D3BC2B8"},{"vulnerable":true,"criteria":"cpe:2.3:a:xwiki:xwiki:15.7:rc1:*:*:*:*:*:*","matchCriteriaId":"EC6DB176-8A0C-4BB3-8C97-0CDBC52F1810"}]}]}],"references":[{"url":"https://github.com/xwiki/xwiki-platform/commit/3e5272f2ef0dff06a8f4db10afd1949b2f9e6eea","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p6cp-6r35-32mh","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://jira.xwiki.org/browse/XWIKI-21208","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://github.com/xwiki/xwiki-platform/commit/3e5272f2ef0dff06a8f4db10afd1949b2f9e6eea","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p6cp-6r35-32mh","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://jira.xwiki.org/browse/XWIKI-21208","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}