vulnerability on Apache JSPWiki, which could allow the attacker to
execute javascript in the victim's browser and get some sensitive
information about the victim.
Apache JSPWiki users should upgrade to 2.12.3 or later.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23254 | Apache JSPWiki Cross-Site Scripting (XSS) Vulnerability in the Image Plugin |
Github GHSA |
GHSA-72ww-4rcw-mc62 | Apache JSPWiki Cross-Site Scripting (XSS) Vulnerability in the Image Plugin |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2025-24854 |
|
Mon, 04 Aug 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:jspwiki:*:*:*:*:*:*:*:* |
Thu, 31 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 31 Jul 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache jspwiki |
|
| Vendors & Products |
Apache
Apache jspwiki |
Thu, 31 Jul 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A carefully crafted request using the Image plugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.3 or later. | |
| Title | Apache JSPWiki: Cross-Site Scripting (XSS) in JSPWiki Image plugin | |
| Weaknesses | CWE-79 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-07-31T17:55:04.477Z
Reserved: 2025-01-25T20:04:53.948Z
Link: CVE-2025-24854
Updated: 2025-07-31T13:38:52.611Z
Status : Analyzed
Published: 2025-07-31T09:15:27.650
Modified: 2025-08-04T13:13:52.373
Link: CVE-2025-24854
No data.
OpenCVE Enrichment
Updated: 2025-07-31T13:29:51Z
EUVD
Github GHSA