{"api_version":"1","generated_at":"2026-04-24T04:01:25+00:00","cve":"CVE-2023-33181","urls":{"html":"https://cve.report/CVE-2023-33181","api":"https://cve.report/api/cve/CVE-2023-33181.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-33181","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-33181"},"summary":{"title":"CVE-2023-33181","description":"Xibo is a content management system (CMS). Starting in version 3.0.0 and prior to version 3.3.5, some API routes will print a stack trace when called with missing or invalid parameters revealing sensitive information about the locations of paths that the server is using. Users should upgrade to version 3.3.5, which fixes this issue. There are no known workarounds aside from upgrading.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-05-30 21:15:00","updated_at":"2023-06-06 01:15:00"},"problem_types":["CWE-209"],"metrics":[],"references":[{"url":"https://claroty.com/team82/disclosure-dashboard","name":"https://claroty.com/team82/disclosure-dashboard","refsource":"MISC","tags":[],"title":"XIoT Vulnerability Disclosure Dashboard | Claroty","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-c9cx-ghwr-x58m","name":"https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-c9cx-ghwr-x58m","refsource":"MISC","tags":[],"title":"Sensitive Information Disclosure abusing Stack Trace in Xibo CMS · Advisory · xibosignage/xibo-cms · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://xibosignage.com/blog/security-advisory-2023-05/","name":"https://xibosignage.com/blog/security-advisory-2023-05/","refsource":"MISC","tags":[],"title":"Security Advisory - 5 issues affecting the CMS","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-33181","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33181","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"33181","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xibosignage","cpe5":"xibo","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-33181","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Xibo is a content management system (CMS). Starting in version 3.0.0 and prior to version 3.3.5, some API routes will print a stack trace when called with missing or invalid parameters revealing sensitive information about the locations of paths that the server is using. Users should upgrade to version 3.3.5, which fixes this issue. There are no known workarounds aside from upgrading."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-209: Generation of Error Message Containing Sensitive Information","cweId":"CWE-209"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"xibosignage","product":{"product_data":[{"product_name":"xibo-cms","version":{"version_data":[{"version_affected":"=","version_value":">= 3.0.0, < 3.3.5"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-c9cx-ghwr-x58m","refsource":"MISC","name":"https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-c9cx-ghwr-x58m"},{"url":"https://claroty.com/team82/disclosure-dashboard","refsource":"MISC","name":"https://claroty.com/team82/disclosure-dashboard"},{"url":"https://xibosignage.com/blog/security-advisory-2023-05/","refsource":"MISC","name":"https://xibosignage.com/blog/security-advisory-2023-05/"}]},"source":{"advisory":"GHSA-c9cx-ghwr-x58m","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-05-30 21:15:00","lastModifiedDate":"2023-06-06 01:15:00","problem_types":["CWE-209"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.3.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}