CVE-2023-50719
Java vulnerability analysis and mitigation

Overview

The Solr-based search in XWiki Platform, a generic wiki platform, contains a vulnerability (CVE-2023-50719) that was introduced in version 7.2-milestone-2 and affects versions prior to 14.10.15, 15.5.2, and 15.7-rc-1. The vulnerability allows anyone with view rights on user profiles to access password hashes of all users, with user profiles being public by default (GitHub Advisory).

Technical details

The vulnerability exists in the Solr search functionality where password hashes are improperly indexed and exposed through the search interface. By default, passwords in XWiki are salted and hashed with SHA-512. The issue can be reproduced by searching for 'propertyvalue:?* AND reference:*.password' and deselecting the 'Document' property under 'Result type' in the search refinement widget. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (GitHub Advisory).

Impact

The vulnerability exposes password hashes of all users, enabling potential offline password cracking attacks, particularly against weak passwords. Additionally, the vulnerability affects configurations used by extensions that contain passwords like API keys, which are normally inaccessible but become exposed in plain text through this vulnerability. This impacts both wikis using local authentication and those using external authentication mechanisms (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in XWiki versions 14.10.15, 15.5.2, and 15.7RC1. The fix was implemented as part of patching another vulnerability (GHSA-2grh-gr37-2283), specifically in the part that changes the indexing of single properties to use the same code as the main document for getting the property's value. There are no known workarounds apart from upgrading to a fixed version (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-29847HIGH7.5
  • JavaJava
  • org.apache.linkis:linkis
NoYesJan 19, 2026
CVE-2026-1050MEDIUM6.9
  • JavaJava
  • net.risesoft:risenet-y9boot-support-platform-service
NoNoJan 17, 2026
CVE-2025-15104MEDIUM6.9
  • JavaScriptJavaScript
  • vnu-jar
NoNoJan 16, 2026
CVE-2025-59355MEDIUM6.5
  • JavaJava
  • org.apache.linkis:linkis-metadata
NoYesJan 19, 2026
CVE-2026-0858MEDIUM5.1
  • JavaJava
  • net.sourceforge.plantuml:plantuml
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management