A carefully crafted request when creating a header link using the
wiki markup syntax, which could allow the attacker to execute javascript
in the victim's browser and get some sensitive information about the
victim.
Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too.
Apache JSPWiki users should upgrade to 2.12.3 or later.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2025-24853 |
![]() ![]() |
History
Mon, 04 Aug 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:apache:jspwiki:*:*:*:*:*:*:*:* |
Thu, 31 Jul 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 31 Jul 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache jspwiki |
|
Vendors & Products |
Apache
Apache jspwiki |
Thu, 31 Jul 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too. Apache JSPWiki users should upgrade to 2.12.3 or later. | |
Title | Apache JSPWiki: Cross-Site Scripting (XSS) in JSPWiki Header Link processing | |
Weaknesses | CWE-79 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published: 2025-07-31T08:42:06.453Z
Updated: 2025-07-31T17:55:11.018Z
Reserved: 2025-01-25T20:03:15.418Z
Link: CVE-2025-24853

Updated: 2025-07-31T13:39:04.100Z

Status : Analyzed
Published: 2025-07-31T09:15:26.160
Modified: 2025-08-04T13:13:54.440
Link: CVE-2025-24853

No data.