Moderate severityNVD Advisory· Published Jul 1, 2021· Updated Aug 3, 2024
The reset password form reveal users email address
CVE-2021-32731
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Between (and including) versions 13.1RC1 and 13.1, the reset password form reveals the email address of users just by giving their username. The problem has been patched on XWiki 13.2RC1. As a workaround, it is possible to manually modify the resetpasswordinline.vm to perform the changes made to mitigate the vulnerability.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.xwiki.platform:xwiki-platform-webMaven | >= 13.1, < 13.2 | 13.2 |
Affected products
1- Range: >= 13.1RC1, <= 13.1
Patches
10cf716250b36XWIKI-18400: Wrong message after reset password
2 files changed · +6 −2
xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-test/xwiki-platform-administration-test-docker/src/test/it/org/xwiki/administration/test/ui/ResetPasswordIT.java+5 −1 modified@@ -138,7 +138,11 @@ public void resetForgottenPassword(TestUtils setup) throws Exception // Actually reset the user's password resetPasswordPage = ResetPasswordPage.gotoPage(); resetPasswordPage.setUserName(userName); - resetPasswordPage.clickResetPassword(); + ResetPasswordPage newResetPasswordPage = resetPasswordPage.clickResetPassword(); + assertTrue(newResetPasswordPage.getMessage().contains("An e-mail was sent"), + "Actual message: " + newResetPasswordPage.getMessage()); + assertFalse(newResetPasswordPage.getMessage().contains("foo@bar.com"), + "Actual message: " + newResetPasswordPage.getMessage()); // Check the result assertTrue(resetPasswordPage.isResetPasswordSent());
xwiki-platform-core/xwiki-platform-web/src/main/webapp/templates/resetpasswordinline.vm+1 −1 modified@@ -84,7 +84,7 @@ $services.localization.render('xe.admin.passwordReset.instructions') #displayResetPasswordException() #else #resetPasswordBoxStart("default") - $services.localization.render('xe.admin.passwordReset.emailSent', ["$email"]) + $services.localization.render('xe.admin.passwordReset.emailSent', ["$services.mail.general.obfuscate($email)"]) #end #end <div>
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-h4m4-pgp4-whgmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-32731ghsaADVISORY
- github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dffghsax_refsource_MISCWEB
- github.com/xwiki/xwiki-platform/security/advisories/GHSA-h4m4-pgp4-whgmghsax_refsource_CONFIRMWEB
- jira.xwiki.org/browse/XWIKI-18400ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.