Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24853: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Apache Software Foundation Apache JSPWiki

0
High
VulnerabilityCVE-2025-24853cvecve-2025-24853cwe-79
Published: Thu Jul 31 2025 (07/31/2025, 08:42:06 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache JSPWiki

Description

A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too. Apache JSPWiki users should upgrade to 2.12.3 or later.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:43:49 UTC

Technical Analysis

CVE-2025-24853 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting the Apache JSPWiki software maintained by the Apache Software Foundation. The vulnerability arises from improper neutralization of input during web page generation, specifically when users create header links using the wiki markup syntax or when content is parsed via the markdown parser. An attacker can craft a malicious request embedding JavaScript code within these inputs, which JSPWiki fails to sanitize properly. When a victim views the affected wiki page, the malicious script executes in their browser context, potentially allowing the attacker to steal sensitive information such as session cookies, authentication tokens, or other data accessible in the browser environment. The vulnerability does not require any privileges or user interaction to exploit, making it remotely exploitable over the network. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, but high integrity impact and no availability impact. The vulnerability was reserved in January 2025 and published in July 2025. The Apache JSPWiki team has addressed the issue in version 2.12.3, recommending all users upgrade to this or later versions to mitigate the risk. No public exploits have been reported yet, but the nature of XSS vulnerabilities means exploitation is straightforward once the vulnerability is known.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive information accessed via JSPWiki platforms. Since JSPWiki is often used for internal documentation, knowledge sharing, and collaboration, exploitation could lead to session hijacking, unauthorized access to internal resources, or leakage of confidential business information. The lack of required authentication or user interaction increases the risk of widespread exploitation, especially in organizations with publicly accessible JSPWiki instances. This could undermine trust in internal communication tools and potentially facilitate further attacks such as phishing or lateral movement within networks. The impact is particularly critical for sectors handling sensitive data, including finance, government, healthcare, and critical infrastructure. Additionally, the vulnerability could be leveraged to target European Union institutions or companies involved in cross-border collaborations, amplifying the potential damage.

Mitigation Recommendations

The primary and most effective mitigation is to upgrade Apache JSPWiki to version 2.12.3 or later, where the vulnerability has been fixed. Organizations should prioritize this upgrade in their patch management cycles. Beyond upgrading, administrators should implement strict input validation and output encoding on wiki markup inputs, especially for header links and markdown content, to prevent injection of malicious scripts. Employing Content Security Policy (CSP) headers can help mitigate the impact of any residual XSS by restricting script execution sources. Monitoring web server logs and application logs for unusual or suspicious wiki content submissions can help detect attempted exploitation. Additionally, educating users about the risks of clicking unknown or suspicious links within wiki pages can reduce the likelihood of successful attacks. For organizations with public-facing JSPWiki instances, consider restricting access or implementing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting JSPWiki.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-01-25T20:03:15.418Z
Cvss Version
null
State
PUBLISHED

Threat ID: 688b2db3ad5a09ad00b4fe1d

Added to database: 7/31/2025, 8:47:47 AM

Last enriched: 11/4/2025, 9:43:49 PM

Last updated: 12/12/2025, 9:11:58 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats