A carefully crafted request using the Image plugin could trigger an XSS
vulnerability on Apache JSPWiki, which could allow the attacker to
execute javascript in the victim's browser and get some sensitive
information about the victim.
Apache JSPWiki users should upgrade to 2.12.3 or later.
References
Link | Resource |
---|---|
https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2025-24854 | Vendor Advisory |
Configurations
History
04 Aug 2025, 13:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apache jspwiki
Apache |
|
References | () https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2025-24854 - Vendor Advisory | |
CPE | cpe:2.3:a:apache:jspwiki:*:*:*:*:*:*:*:* |
31 Jul 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
31 Jul 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-31 09:15
Updated : 2025-08-04 13:13
NVD link : CVE-2025-24854
Mitre link : CVE-2025-24854
CVE.ORG link : CVE-2025-24854
JSON object : View
Products Affected
apache
- jspwiki
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')