{"api_version":"1","generated_at":"2026-04-15T04:40:45+00:00","cve":"CVE-2023-28158","urls":{"html":"https://cve.report/CVE-2023-28158","api":"https://cve.report/api/cve/CVE-2023-28158.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-28158","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-28158"},"summary":{"title":"CVE-2023-28158","description":"Privilege escalation via stored XSS using the file upload service to upload malicious content.\nThe issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.","state":"PUBLIC","assigner":"security@apache.org","published_at":"2023-03-29 13:15:00","updated_at":"2023-04-18 03:15:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"http://www.openwall.com/lists/oss-security/2023/04/18/2","name":"http://www.openwall.com/lists/oss-security/2023/04/18/2","refsource":"MISC","tags":[],"title":"oss-security - Re: CVE-2023-28158: Apache Archiva privilege\n escalation","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt","name":"https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-28158","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28158","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"28158","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"archiva","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-28158","ASSIGNER":"security@apache.org","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Privilege escalation via stored XSS using the file upload service to upload malicious content.\nThe issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","cweId":"CWE-79"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apache Software Foundation","product":{"product_data":[{"product_name":"Apache Archiva","version":{"version_data":[{"version_affected":"<","version_name":"2.0","version_value":"2.2.10"}]}}]}}]}},"references":{"reference_data":[{"url":"https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt","refsource":"MISC","name":"https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt"},{"url":"http://www.openwall.com/lists/oss-security/2023/04/18/2","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2023/04/18/2"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"sandr0 (sandr0.xyz) "}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L","version":"3.1"}]}},"nvd":{"publishedDate":"2023-03-29 13:15:00","lastModifiedDate":"2023-04-18 03:15:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","versionEndExcluding":"2.2.10","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}