Description
XWiki Platform is a generic wiki platform. Starting in version 7.3-milestone-1 and prior to versions 14.4.8, 14.10.6, and 15.1, ny user can call a REST endpoint and obtain the obfuscated passwords, even when the mail obfuscation is activated. The issue has been patched in XWiki 14.4.8, 14.10.6, and 15.1. There is no known workaround.
Remediation
References
https://jira.xwiki.org/browse/XWIKI-16138
https://github.com/xwiki/xwiki-platform/commit/824cd742ecf5439971247da11bfe7e0ad2b10ede
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8g9c-c9cm-9c56
Related Vulnerabilities
CVE-2022-28220 Vulnerability in maven package org.apache.james:james-server-protocols-managesieve
CVE-2017-2609 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2022-2564 Vulnerability in maven package org.webjars.npm:mongoose
CVE-2020-15777 Vulnerability in maven package com.gradle:gradle-enterprise-maven-extension
CVE-2022-28355 Vulnerability in maven package org.scala-js:scalajs-library_2.11