SummaryAs a Confluence administrator it was potentially possible to provide a malicious XML file.
Advisory Release Date



Linchpin User Profiles
Linchpin Essentials
Linchpin Intranet Suite

Affected Versions

Linchpin Intranet Suite 5.1.3 and all prior versions

Linchpin Essentials 2.1.3 and all prior versions

Linchpin User Profiles 3.1.6 and all prior versions

Fixed Versions

Linchpin Intranet Suite 5.1.4

Linchpin Essentials 2.1.4

Linchpin User Profiles 3.1.7


In an internal review we could identify that a Confluence administrator could provide a malicious XML file to inject sensitive data into a profile field in the user profile.

Affected are the apps Linchpin User Profiles up to and including version 3.1.6, Linchpin Intranet Suite up to and including version 5.1.3 and Linchpin Essentials up to and including version 2.1.3.


The vulnerability is rated as 6.5 according to CVSS. The score is calculated as CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N.


For Linchpin User Profiles customers: Update to Linchpin User Profiles version 3.1.7 or later.

For Linchpin Essentials customers: Update to Linchpin Essentials 2.1.4 or later.

For Linchpin Suite customers: Update to Linchpin Suite 5.1.4 or later.

Should you be unable to update the Linchpin Intranet Suite to one of the listed versions, please reach out to our support team at

  • No labels

This content was last updated on 01/07/2022.

This content hasn't been updated in a while. That doesn't have to be a problem. Some of our pages live for years without becoming obsolete.

Old content can be incorrect, misleading or outdated. Please get in contact with us via a form on this page, our live chat or via email with if you are in doubt, have a question, suggestion, or want changes from us.