{"api_version":"1","generated_at":"2026-04-22T16:07:21+00:00","cve":"CVE-2023-45144","urls":{"html":"https://cve.report/CVE-2023-45144","api":"https://cve.report/api/cve/CVE-2023-45144.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-45144","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-45144"},"summary":{"title":"CVE-2023-45144","description":"com.xwiki.identity-oauth:identity-oauth-ui is a package to aid in building identity and service providers based on OAuth authorizations. When a user logs in via the OAuth method, the identityOAuth parameters sent in the GET request is vulnerable to cross site scripting (XSS) and XWiki syntax injection. This allows remote code execution via the groovy macro and thus affects the confidentiality, integrity and availability of the whole XWiki installation. The issue has been fixed in Identity OAuth version 1.6. There are no known workarounds for this vulnerability and users are advised to upgrade.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-10-16 21:15:00","updated_at":"2023-10-20 20:00:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://github.com/xwikisas/identity-oauth/blob/master/ui/src/main/resources/IdentityOAuth/LoginUIExtension.vm#L58","name":"https://github.com/xwikisas/identity-oauth/blob/master/ui/src/main/resources/IdentityOAuth/LoginUIExtension.vm#L58","refsource":"MISC","tags":[],"title":"File not found · GitHub","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"https://jira.xwiki.org/browse/XWIKI-20719","name":"https://jira.xwiki.org/browse/XWIKI-20719","refsource":"MISC","tags":[],"title":"Log in - XWiki.org JIRA","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/xwikisas/identity-oauth/commit/d805d3154b17c6bf455ddf5deb0a3461a3833bc6","name":"https://github.com/xwikisas/identity-oauth/commit/d805d3154b17c6bf455ddf5deb0a3461a3833bc6","refsource":"MISC","tags":[],"title":"Improve escaping (#30) · xwikisas/identity-oauth@d805d31 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/xwikisas/identity-oauth/commit/d805d3154b17c6bf455ddf5deb0a3461a3833bc6#diff-2ab2e0716443d790d7d798320e4a45151661f4eca5440331f4a227b29c87c188","name":"https://github.com/xwikisas/identity-oauth/commit/d805d3154b17c6bf455ddf5deb0a3461a3833bc6#diff-2ab2e0716443d790d7d798320e4a45151661f4eca5440331f4a227b29c87c188","refsource":"MISC","tags":[],"title":"Improve escaping (#30) · xwikisas/identity-oauth@d805d31 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/xwikisas/identity-oauth/security/advisories/GHSA-h2rm-29ch-wfmh","name":"https://github.com/xwikisas/identity-oauth/security/advisories/GHSA-h2rm-29ch-wfmh","refsource":"MISC","tags":[],"title":"Privilege escalation (PR)/remote code execution from login screen through unescaped URL parameter · Advisory · xwikisas/identity-oauth · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-45144","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45144","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"45144","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xwiki","cpe5":"oauth_identity","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-45144","qid":"995604","title":"Java (Maven) Security Update for com.xwiki.identity-oauth:identity-oauth-ui (GHSA-h2rm-29ch-wfmh)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-45144","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"com.xwiki.identity-oauth:identity-oauth-ui is a package to aid in building identity and service providers based on OAuth authorizations. When a user logs in via the OAuth method, the identityOAuth parameters sent in the GET request is vulnerable to cross site scripting (XSS) and XWiki syntax injection. This allows remote code execution via the groovy macro and thus affects the confidentiality, integrity and availability of the whole XWiki installation. The issue has been fixed in Identity OAuth version 1.6. There are no known workarounds for this vulnerability and users are advised to upgrade."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","cweId":"CWE-79"}]},{"description":[{"lang":"eng","value":"CWE-94: Improper Control of Generation of Code ('Code Injection')","cweId":"CWE-94"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"xwikisas","product":{"product_data":[{"product_name":"identity-oauth","version":{"version_data":[{"version_affected":"=","version_value":">= 1.0, < 1.6"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/xwikisas/identity-oauth/security/advisories/GHSA-h2rm-29ch-wfmh","refsource":"MISC","name":"https://github.com/xwikisas/identity-oauth/security/advisories/GHSA-h2rm-29ch-wfmh"},{"url":"https://github.com/xwikisas/identity-oauth/commit/d805d3154b17c6bf455ddf5deb0a3461a3833bc6","refsource":"MISC","name":"https://github.com/xwikisas/identity-oauth/commit/d805d3154b17c6bf455ddf5deb0a3461a3833bc6"},{"url":"https://github.com/xwikisas/identity-oauth/commit/d805d3154b17c6bf455ddf5deb0a3461a3833bc6#diff-2ab2e0716443d790d7d798320e4a45151661f4eca5440331f4a227b29c87c188","refsource":"MISC","name":"https://github.com/xwikisas/identity-oauth/commit/d805d3154b17c6bf455ddf5deb0a3461a3833bc6#diff-2ab2e0716443d790d7d798320e4a45151661f4eca5440331f4a227b29c87c188"},{"url":"https://github.com/xwikisas/identity-oauth/blob/master/ui/src/main/resources/IdentityOAuth/LoginUIExtension.vm#L58","refsource":"MISC","name":"https://github.com/xwikisas/identity-oauth/blob/master/ui/src/main/resources/IdentityOAuth/LoginUIExtension.vm#L58"},{"url":"https://jira.xwiki.org/browse/XWIKI-20719","refsource":"MISC","name":"https://jira.xwiki.org/browse/XWIKI-20719"}]},"source":{"advisory":"GHSA-h2rm-29ch-wfmh","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-10-16 21:15:00","lastModifiedDate":"2023-10-20 20:00:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.6,"baseSeverity":"CRITICAL"},"exploitabilityScore":2.8,"impactScore":6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:xwiki:oauth_identity:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0","versionEndExcluding":"1.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}