Home

Description

A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too. Apache JSPWiki users should upgrade to 2.12.3 or later.

PUBLISHED Reserved 2025-01-25 | Published 2025-07-31 | Updated 2025-11-04 | Assigner apache

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

Any version
affected

Credits

The issue was discovered by XBOW (https://github.com/xbow-security, https://xbow.com) finder

References

www.openwall.com/lists/oss-security/2025/07/30/2

jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2025-24853 vendor-advisory

cve.org (CVE-2025-24853)

nvd.nist.gov (CVE-2025-24853)

Download JSON