ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause "javascript:" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4246-1 libowasp-esapi-java security update
EUVD EUVD EUVD-2022-1809 ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause "javascript:" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.
Github GHSA Github GHSA GHSA-q77q-vx4q-xx6q Cross-site Scripting in org.owasp.esapi:esapi
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00346}

epss

{'score': 0.00343}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-22T18:03:29.928Z

Reserved: 2022-02-10T00:00:00.000Z

Link: CVE-2022-24891

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-27T21:15:08.523

Modified: 2024-11-21T06:51:20.093

Link: CVE-2022-24891

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.