CVE-2023-47320: n/a in n/a
Silverpeas Core 6.3.1 is vulnerable to Incorrect Access Control. An attacker with low privileges is able to execute the administrator-only function of putting the application in "Maintenance Mode" due to broken access control. This makes the application unavailable to all users. This affects Silverpeas Core 6.3.1 and below.
AI Analysis
Technical Summary
CVE-2023-47320 is a high-severity vulnerability affecting Silverpeas Core version 6.3.1 and earlier. The vulnerability stems from incorrect access control (CWE-863), allowing an attacker with low privileges to invoke an administrator-only function: placing the application into "Maintenance Mode." This function is intended to be restricted to administrators to prevent unauthorized disruption. However, due to broken access control mechanisms, the attacker can trigger this mode without proper authorization. When the application enters Maintenance Mode, it becomes unavailable to all users, effectively causing a denial of service (DoS) condition. The vulnerability is remotely exploitable over the network (AV:N), requires low privileges (PR:L), does not require user interaction (UI:N), and affects the integrity and availability of the application (I:H, A:H) but not confidentiality (C:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other components or systems. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on December 13, 2023, and is tracked under CVE-2023-47320.
Potential Impact
For European organizations using Silverpeas Core 6.3.1 or earlier, this vulnerability poses a significant risk of service disruption. Silverpeas is a collaborative platform often used for intranet portals, document management, and enterprise content management. An attacker exploiting this flaw could cause downtime by forcing the platform into Maintenance Mode, impacting business continuity, employee productivity, and potentially critical internal communications. While the vulnerability does not expose sensitive data directly, the denial of service could indirectly affect confidentiality and integrity by preventing timely access to information or updates. Organizations relying heavily on Silverpeas for operational workflows could face operational delays and reputational damage. Furthermore, sectors with strict availability requirements, such as government agencies, healthcare, and financial institutions, may experience compliance issues or service level agreement (SLA) breaches due to unplanned outages.
Mitigation Recommendations
Organizations should immediately audit their Silverpeas Core deployments to identify affected versions (6.3.1 and below). Until an official patch is released, implement strict network-level access controls to limit access to the Silverpeas management interfaces only to trusted administrators and internal networks. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized attempts to invoke the Maintenance Mode function. Monitor application logs for unusual access patterns or attempts to trigger administrative functions by low-privilege users. Additionally, review and harden role-based access control (RBAC) configurations within Silverpeas to ensure no unintended privilege escalations are possible. Consider isolating the Silverpeas server in a segmented network zone to reduce exposure. Once a vendor patch becomes available, prioritize timely deployment. Finally, conduct user awareness training to recognize and report suspicious activities related to the platform.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2023-47320: n/a in n/a
Description
Silverpeas Core 6.3.1 is vulnerable to Incorrect Access Control. An attacker with low privileges is able to execute the administrator-only function of putting the application in "Maintenance Mode" due to broken access control. This makes the application unavailable to all users. This affects Silverpeas Core 6.3.1 and below.
AI-Powered Analysis
Technical Analysis
CVE-2023-47320 is a high-severity vulnerability affecting Silverpeas Core version 6.3.1 and earlier. The vulnerability stems from incorrect access control (CWE-863), allowing an attacker with low privileges to invoke an administrator-only function: placing the application into "Maintenance Mode." This function is intended to be restricted to administrators to prevent unauthorized disruption. However, due to broken access control mechanisms, the attacker can trigger this mode without proper authorization. When the application enters Maintenance Mode, it becomes unavailable to all users, effectively causing a denial of service (DoS) condition. The vulnerability is remotely exploitable over the network (AV:N), requires low privileges (PR:L), does not require user interaction (UI:N), and affects the integrity and availability of the application (I:H, A:H) but not confidentiality (C:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other components or systems. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on December 13, 2023, and is tracked under CVE-2023-47320.
Potential Impact
For European organizations using Silverpeas Core 6.3.1 or earlier, this vulnerability poses a significant risk of service disruption. Silverpeas is a collaborative platform often used for intranet portals, document management, and enterprise content management. An attacker exploiting this flaw could cause downtime by forcing the platform into Maintenance Mode, impacting business continuity, employee productivity, and potentially critical internal communications. While the vulnerability does not expose sensitive data directly, the denial of service could indirectly affect confidentiality and integrity by preventing timely access to information or updates. Organizations relying heavily on Silverpeas for operational workflows could face operational delays and reputational damage. Furthermore, sectors with strict availability requirements, such as government agencies, healthcare, and financial institutions, may experience compliance issues or service level agreement (SLA) breaches due to unplanned outages.
Mitigation Recommendations
Organizations should immediately audit their Silverpeas Core deployments to identify affected versions (6.3.1 and below). Until an official patch is released, implement strict network-level access controls to limit access to the Silverpeas management interfaces only to trusted administrators and internal networks. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized attempts to invoke the Maintenance Mode function. Monitor application logs for unusual access patterns or attempts to trigger administrative functions by low-privilege users. Additionally, review and harden role-based access control (RBAC) configurations within Silverpeas to ensure no unintended privilege escalations are possible. Consider isolating the Silverpeas server in a segmented network zone to reduce exposure. Once a vendor patch becomes available, prioritize timely deployment. Finally, conduct user awareness training to recognize and report suspicious activities related to the platform.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-11-06T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f6ee00acd01a24926471c
Added to database: 5/22/2025, 6:37:20 PM
Last enriched: 7/8/2025, 7:42:48 AM
Last updated: 7/29/2025, 3:55:27 AM
Views: 9
Related Threats
CVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
MediumCVE-2025-50861: n/a
HighCVE-2025-8978: Insufficient Verification of Data Authenticity in D-Link DIR-619L
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.