Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rrff-chj9-w4c7

Опубликовано: 31 июл. 2025
Источник: github
Github: Прошло ревью
CVSS4: 6.9

Описание

Apache JSPWiki Cross-Site Scripting (XSS) Vulnerability via Header Link Rendering

A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.

Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too.

Apache JSPWiki users should upgrade to 2.12.3 or later.

Пакеты

Наименование

org.apache.jspwiki:jspwiki-main

maven
Затронутые версииВерсия исправления

< 2.12.3

2.12.3

Наименование

org.apache.jspwiki:jspwiki-markdown

maven
Затронутые версииВерсия исправления

< 2.12.3

2.12.3

EPSS

Процентиль: 44%
0.00221
Низкий

6.9 Medium

CVSS4

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 7.5
ubuntu
6 месяцев назад

A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too. Apache JSPWiki users should upgrade to 2.12.3 or later.

CVSS3: 7.5
nvd
6 месяцев назад

A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too. Apache JSPWiki users should upgrade to 2.12.3 or later.

CVSS3: 7.5
debian
6 месяцев назад

A carefully crafted request when creating a header link using the wik ...

EPSS

Процентиль: 44%
0.00221
Низкий

6.9 Medium

CVSS4

Дефекты

CWE-79