On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-0683 On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
Github GHSA Github GHSA GHSA-3rx2-x6mx-grj3 Cross-site scripting in Apache JSPWiki
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T22:10:09.549Z

Reserved: 2019-03-26T00:00:00

Link: CVE-2019-10089

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-09-23T15:15:10.420

Modified: 2024-11-21T04:18:22.870

Link: CVE-2019-10089

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.