// For flags

CVE-2021-32620

Users registered with email verification can self re-activate their disabled accounts

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions prior to 11.10.13, 12.6.7, and 12.10.2, a user disabled on a wiki using email verification for registration canouldre-activate themself by using the activation link provided for his registration. The problem has been patched in the following versions of XWiki: 11.10.13, 12.6.7, 12.10.2, 13.0. It is possible to workaround the issue by resetting the `validkey` property of the disabled XWiki users. This can be done by editing the user profile with object editor.

La Plataforma XWiki es una plataforma wiki genérica que ofrece servicios de ejecución para las aplicaciones construidas sobre ella. En las versiones anteriores a la 11.10.13, 12.6.7 y 12.10.2, un usuario deshabilitado en un wiki que utilizaba la verificación por correo electrónico para el registro podía volver a activarse utilizando el enlace de activación proporcionado para su registro. El problema ha sido parcheado en las siguientes versiones de XWiki: 11.10.13, 12.6.7, 12.10.2, 13.0. Es posible solucionar el problema restableciendo la propiedad `validkey` de los usuarios de XWiki deshabilitados. Esto se puede hacer editando el perfil del usuario con el editor de objetos

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-05-12 CVE Reserved
  • 2021-05-28 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-285: Improper Authorization
  • CWE-863: Incorrect Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Xwiki
Search vendor "Xwiki"
Xwiki
Search vendor "Xwiki" for product "Xwiki"
>= 11.6 < 11.10.13
Search vendor "Xwiki" for product "Xwiki" and version " >= 11.6 < 11.10.13"
-
Affected
Xwiki
Search vendor "Xwiki"
Xwiki
Search vendor "Xwiki" for product "Xwiki"
>= 12.0 < 12.6.7
Search vendor "Xwiki" for product "Xwiki" and version " >= 12.0 < 12.6.7"
-
Affected
Xwiki
Search vendor "Xwiki"
Xwiki
Search vendor "Xwiki" for product "Xwiki"
>= 12.7 < 12.10.2
Search vendor "Xwiki" for product "Xwiki" and version " >= 12.7 < 12.10.2"
-
Affected
Xwiki
Search vendor "Xwiki"
Xwiki
Search vendor "Xwiki" for product "Xwiki"
>= 12.10.3 < 13.0
Search vendor "Xwiki" for product "Xwiki" and version " >= 12.10.3 < 13.0"
-
Affected