First published: Thu Jul 01 2021(Updated: )
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Between (and including) versions 13.1RC1 and 13.1, the reset password form reveals the email address of users just by giving their username. The problem has been patched on XWiki 13.2RC1. As a workaround, it is possible to manually modify the `resetpasswordinline.vm` to perform the changes made to mitigate the vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | =13.1 | |
Xwiki | =13.1-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32731 has been classified as a medium severity vulnerability due to the exposure of user email addresses.
To mitigate CVE-2021-32731, upgrade to XWiki version 13.1 or later.
CVE-2021-32731 affects XWiki versions 13.1 and 13.1RC1, allowing user email exposure through the password reset feature.
CVE-2021-32731 allows attackers to discover email addresses of users by providing their usernames.
Yes, a patch for CVE-2021-32731 is included in the XWiki 13.1 release.