Severity: Medium

Affected versions:

- Apache JSPWiki  before Apache JSPWiki up to 2.12.2

Description:

A carefully crafted request when creating a header link using the
wiki markup syntax, which could allow the attacker to execute javascript
 in the victim's browser and get some sensitive information about the
victim.

Further research by the JSPWiki team showed that the markdown parser
allowed this kind of attack too.

Apache JSPWiki users should upgrade to 2.12.3 or later.

Credit:

The issue was discovered by XBOW (https://github.com/xbow-security,
https://xbow.com) (finder)

References:

https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2025-24853
https://www.cve.org/CVERecord?id=CVE-2025-24853

Reply via email to