CVE-2023-47320: n/a in n/a
Silverpeas Core 6.3.1 is vulnerable to Incorrect Access Control. An attacker with low privileges is able to execute the administrator-only function of putting the application in "Maintenance Mode" due to broken access control. This makes the application unavailable to all users. This affects Silverpeas Core 6.3.1 and below.
AI Analysis
Technical Summary
CVE-2023-47320 is a high-severity vulnerability affecting Silverpeas Core version 6.3.1 and earlier. The vulnerability stems from incorrect access control (CWE-863), allowing an attacker with low privileges to invoke an administrator-only function: placing the application into "Maintenance Mode." This function is intended to be restricted to administrators to prevent unauthorized disruption. However, due to broken access control mechanisms, the attacker can trigger this mode without proper authorization. When the application enters Maintenance Mode, it becomes unavailable to all users, effectively causing a denial of service (DoS) condition. The vulnerability is remotely exploitable over the network (AV:N), requires low privileges (PR:L), does not require user interaction (UI:N), and affects the integrity and availability of the application (I:H, A:H) but not confidentiality (C:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other components or systems. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on December 13, 2023, and is tracked under CVE-2023-47320.
Potential Impact
For European organizations using Silverpeas Core 6.3.1 or earlier, this vulnerability poses a significant risk of service disruption. Silverpeas is a collaborative platform often used for intranet portals, document management, and enterprise content management. An attacker exploiting this flaw could cause downtime by forcing the platform into Maintenance Mode, impacting business continuity, employee productivity, and potentially critical internal communications. While the vulnerability does not expose sensitive data directly, the denial of service could indirectly affect confidentiality and integrity by preventing timely access to information or updates. Organizations relying heavily on Silverpeas for operational workflows could face operational delays and reputational damage. Furthermore, sectors with strict availability requirements, such as government agencies, healthcare, and financial institutions, may experience compliance issues or service level agreement (SLA) breaches due to unplanned outages.
Mitigation Recommendations
Organizations should immediately audit their Silverpeas Core deployments to identify affected versions (6.3.1 and below). Until an official patch is released, implement strict network-level access controls to limit access to the Silverpeas management interfaces only to trusted administrators and internal networks. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized attempts to invoke the Maintenance Mode function. Monitor application logs for unusual access patterns or attempts to trigger administrative functions by low-privilege users. Additionally, review and harden role-based access control (RBAC) configurations within Silverpeas to ensure no unintended privilege escalations are possible. Consider isolating the Silverpeas server in a segmented network zone to reduce exposure. Once a vendor patch becomes available, prioritize timely deployment. Finally, conduct user awareness training to recognize and report suspicious activities related to the platform.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2023-47320: n/a in n/a
Description
Silverpeas Core 6.3.1 is vulnerable to Incorrect Access Control. An attacker with low privileges is able to execute the administrator-only function of putting the application in "Maintenance Mode" due to broken access control. This makes the application unavailable to all users. This affects Silverpeas Core 6.3.1 and below.
AI-Powered Analysis
Technical Analysis
CVE-2023-47320 is a high-severity vulnerability affecting Silverpeas Core version 6.3.1 and earlier. The vulnerability stems from incorrect access control (CWE-863), allowing an attacker with low privileges to invoke an administrator-only function: placing the application into "Maintenance Mode." This function is intended to be restricted to administrators to prevent unauthorized disruption. However, due to broken access control mechanisms, the attacker can trigger this mode without proper authorization. When the application enters Maintenance Mode, it becomes unavailable to all users, effectively causing a denial of service (DoS) condition. The vulnerability is remotely exploitable over the network (AV:N), requires low privileges (PR:L), does not require user interaction (UI:N), and affects the integrity and availability of the application (I:H, A:H) but not confidentiality (C:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other components or systems. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on December 13, 2023, and is tracked under CVE-2023-47320.
Potential Impact
For European organizations using Silverpeas Core 6.3.1 or earlier, this vulnerability poses a significant risk of service disruption. Silverpeas is a collaborative platform often used for intranet portals, document management, and enterprise content management. An attacker exploiting this flaw could cause downtime by forcing the platform into Maintenance Mode, impacting business continuity, employee productivity, and potentially critical internal communications. While the vulnerability does not expose sensitive data directly, the denial of service could indirectly affect confidentiality and integrity by preventing timely access to information or updates. Organizations relying heavily on Silverpeas for operational workflows could face operational delays and reputational damage. Furthermore, sectors with strict availability requirements, such as government agencies, healthcare, and financial institutions, may experience compliance issues or service level agreement (SLA) breaches due to unplanned outages.
Mitigation Recommendations
Organizations should immediately audit their Silverpeas Core deployments to identify affected versions (6.3.1 and below). Until an official patch is released, implement strict network-level access controls to limit access to the Silverpeas management interfaces only to trusted administrators and internal networks. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized attempts to invoke the Maintenance Mode function. Monitor application logs for unusual access patterns or attempts to trigger administrative functions by low-privilege users. Additionally, review and harden role-based access control (RBAC) configurations within Silverpeas to ensure no unintended privilege escalations are possible. Consider isolating the Silverpeas server in a segmented network zone to reduce exposure. Once a vendor patch becomes available, prioritize timely deployment. Finally, conduct user awareness training to recognize and report suspicious activities related to the platform.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-11-06T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f6ee00acd01a24926471c
Added to database: 5/22/2025, 6:37:20 PM
Last enriched: 7/8/2025, 7:42:48 AM
Last updated: 11/29/2025, 11:37:59 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-6666: Use of Hard-coded Cryptographic Key in motogadget mo.lock Ignition Lock
LowCVE-2025-65892: n/a
UnknownCVE-2025-65540: n/a
UnknownCVE-2025-66221: CWE-67: Improper Handling of Windows Device Names in pallets werkzeug
MediumCVE-2025-53939: CWE-20: Improper Input Validation in kiteworks security-advisories
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.