A carefully crafted request when creating a header link using the
wiki markup syntax, which could allow the attacker to execute javascript
in the victim's browser and get some sensitive information about the
victim.
Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too.
Apache JSPWiki users should upgrade to 2.12.3 or later.
References
Link | Resource |
---|---|
https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2025-24853 | Vendor Advisory |
Configurations
History
04 Aug 2025, 13:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2025-24853 - Vendor Advisory | |
First Time |
Apache jspwiki
Apache |
|
CPE | cpe:2.3:a:apache:jspwiki:*:*:*:*:*:*:*:* |
31 Jul 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
Summary |
|
31 Jul 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-31 09:15
Updated : 2025-08-04 13:13
NVD link : CVE-2025-24853
Mitre link : CVE-2025-24853
CVE.ORG link : CVE-2025-24853
JSON object : View
Products Affected
apache
- jspwiki
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')