CVE-2023-47320: n/a in n/a
Silverpeas Core 6.3.1 is vulnerable to Incorrect Access Control. An attacker with low privileges is able to execute the administrator-only function of putting the application in "Maintenance Mode" due to broken access control. This makes the application unavailable to all users. This affects Silverpeas Core 6.3.1 and below.
AI Analysis
Technical Summary
CVE-2023-47320 is a high-severity vulnerability affecting Silverpeas Core version 6.3.1 and earlier. The vulnerability stems from incorrect access control (CWE-863), allowing an attacker with low privileges to invoke an administrator-only function: placing the application into "Maintenance Mode." This function is intended to be restricted to administrators to prevent unauthorized disruption. However, due to broken access control mechanisms, the attacker can trigger this mode without proper authorization. When the application enters Maintenance Mode, it becomes unavailable to all users, effectively causing a denial of service (DoS) condition. The vulnerability is remotely exploitable over the network (AV:N), requires low privileges (PR:L), does not require user interaction (UI:N), and affects the integrity and availability of the application (I:H, A:H) but not confidentiality (C:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other components or systems. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on December 13, 2023, and is tracked under CVE-2023-47320.
Potential Impact
For European organizations using Silverpeas Core 6.3.1 or earlier, this vulnerability poses a significant risk of service disruption. Silverpeas is a collaborative platform often used for intranet portals, document management, and enterprise content management. An attacker exploiting this flaw could cause downtime by forcing the platform into Maintenance Mode, impacting business continuity, employee productivity, and potentially critical internal communications. While the vulnerability does not expose sensitive data directly, the denial of service could indirectly affect confidentiality and integrity by preventing timely access to information or updates. Organizations relying heavily on Silverpeas for operational workflows could face operational delays and reputational damage. Furthermore, sectors with strict availability requirements, such as government agencies, healthcare, and financial institutions, may experience compliance issues or service level agreement (SLA) breaches due to unplanned outages.
Mitigation Recommendations
Organizations should immediately audit their Silverpeas Core deployments to identify affected versions (6.3.1 and below). Until an official patch is released, implement strict network-level access controls to limit access to the Silverpeas management interfaces only to trusted administrators and internal networks. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized attempts to invoke the Maintenance Mode function. Monitor application logs for unusual access patterns or attempts to trigger administrative functions by low-privilege users. Additionally, review and harden role-based access control (RBAC) configurations within Silverpeas to ensure no unintended privilege escalations are possible. Consider isolating the Silverpeas server in a segmented network zone to reduce exposure. Once a vendor patch becomes available, prioritize timely deployment. Finally, conduct user awareness training to recognize and report suspicious activities related to the platform.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2023-47320: n/a in n/a
Description
Silverpeas Core 6.3.1 is vulnerable to Incorrect Access Control. An attacker with low privileges is able to execute the administrator-only function of putting the application in "Maintenance Mode" due to broken access control. This makes the application unavailable to all users. This affects Silverpeas Core 6.3.1 and below.
AI-Powered Analysis
Technical Analysis
CVE-2023-47320 is a high-severity vulnerability affecting Silverpeas Core version 6.3.1 and earlier. The vulnerability stems from incorrect access control (CWE-863), allowing an attacker with low privileges to invoke an administrator-only function: placing the application into "Maintenance Mode." This function is intended to be restricted to administrators to prevent unauthorized disruption. However, due to broken access control mechanisms, the attacker can trigger this mode without proper authorization. When the application enters Maintenance Mode, it becomes unavailable to all users, effectively causing a denial of service (DoS) condition. The vulnerability is remotely exploitable over the network (AV:N), requires low privileges (PR:L), does not require user interaction (UI:N), and affects the integrity and availability of the application (I:H, A:H) but not confidentiality (C:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other components or systems. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on December 13, 2023, and is tracked under CVE-2023-47320.
Potential Impact
For European organizations using Silverpeas Core 6.3.1 or earlier, this vulnerability poses a significant risk of service disruption. Silverpeas is a collaborative platform often used for intranet portals, document management, and enterprise content management. An attacker exploiting this flaw could cause downtime by forcing the platform into Maintenance Mode, impacting business continuity, employee productivity, and potentially critical internal communications. While the vulnerability does not expose sensitive data directly, the denial of service could indirectly affect confidentiality and integrity by preventing timely access to information or updates. Organizations relying heavily on Silverpeas for operational workflows could face operational delays and reputational damage. Furthermore, sectors with strict availability requirements, such as government agencies, healthcare, and financial institutions, may experience compliance issues or service level agreement (SLA) breaches due to unplanned outages.
Mitigation Recommendations
Organizations should immediately audit their Silverpeas Core deployments to identify affected versions (6.3.1 and below). Until an official patch is released, implement strict network-level access controls to limit access to the Silverpeas management interfaces only to trusted administrators and internal networks. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized attempts to invoke the Maintenance Mode function. Monitor application logs for unusual access patterns or attempts to trigger administrative functions by low-privilege users. Additionally, review and harden role-based access control (RBAC) configurations within Silverpeas to ensure no unintended privilege escalations are possible. Consider isolating the Silverpeas server in a segmented network zone to reduce exposure. Once a vendor patch becomes available, prioritize timely deployment. Finally, conduct user awareness training to recognize and report suspicious activities related to the platform.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-11-06T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f6ee00acd01a24926471c
Added to database: 5/22/2025, 6:37:20 PM
Last enriched: 7/8/2025, 7:42:48 AM
Last updated: 1/19/2026, 8:36:56 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1145: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-1144: Use After Free in quickjs-ng quickjs
MediumCVE-2026-1143: Buffer Overflow in TOTOLINK A3700R
HighCVE-2026-1142: Cross-Site Request Forgery in PHPGurukul News Portal
MediumCVE-2026-1141: Improper Authorization in PHPGurukul News Portal
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.