A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too. Apache JSPWiki users should upgrade to 2.12.3 or later.
History

Mon, 04 Aug 2025 13:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:jspwiki:*:*:*:*:*:*:*:*

Thu, 31 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 31 Jul 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache jspwiki
Vendors & Products Apache
Apache jspwiki

Thu, 31 Jul 2025 09:00:00 +0000

Type Values Removed Values Added
Description A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too. Apache JSPWiki users should upgrade to 2.12.3 or later.
Title Apache JSPWiki: Cross-Site Scripting (XSS) in JSPWiki Header Link processing
Weaknesses CWE-79
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-07-31T08:42:06.453Z

Updated: 2025-07-31T17:55:11.018Z

Reserved: 2025-01-25T20:03:15.418Z

Link: CVE-2025-24853

cve-icon Vulnrichment

Updated: 2025-07-31T13:39:04.100Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-31T09:15:26.160

Modified: 2025-08-04T13:13:54.440

Link: CVE-2025-24853

cve-icon Redhat

No data.