logo

CVE-2025-24853 org.apache.jspwiki:jspwiki-markdown

Package

Manager: maven
Name: org.apache.jspwiki:jspwiki-markdown
Vulnerable Version: >=0 <2.12.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

EPSS: 0.00335 pctl0.5567

Details

Apache JSPWiki Cross-Site Scripting (XSS) Vulnerability via Header Link Rendering A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too. Apache JSPWiki users should upgrade to 2.12.3 or later.

Metadata

Created: 2025-07-31T09:32:49Z
Modified: 2025-07-31T14:11:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-rrff-chj9-w4c7/GHSA-rrff-chj9-w4c7.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-rrff-chj9-w4c7
Finding: F008
Auto approve: 1