Description
On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
Published: 2019-09-23
Score: 6.1 Medium
EPSS: 4.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-0683 On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
Github GHSA Github GHSA GHSA-3rx2-x6mx-grj3 Cross-site scripting in Apache JSPWiki
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T22:10:09.549Z

Reserved: 2019-03-26T00:00:00.000Z

Link: CVE-2019-10089

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-09-23T15:15:10.420

Modified: 2024-11-21T04:18:22.870

Link: CVE-2019-10089

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses