CVE-2025-24853: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Apache Software Foundation Apache JSPWiki
A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too. Apache JSPWiki users should upgrade to 2.12.3 or later.
AI Analysis
Technical Summary
CVE-2025-24853 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting the Apache JSPWiki software maintained by the Apache Software Foundation. The vulnerability arises from improper neutralization of input during web page generation, specifically when users create header links using the wiki markup syntax or when content is parsed via the markdown parser. An attacker can craft a malicious request embedding JavaScript code within these inputs, which JSPWiki fails to sanitize properly. When a victim views the affected wiki page, the malicious script executes in their browser context, potentially allowing the attacker to steal sensitive information such as session cookies, authentication tokens, or other data accessible in the browser environment. The vulnerability does not require any privileges or user interaction to exploit, making it remotely exploitable over the network. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, but high integrity impact and no availability impact. The vulnerability was reserved in January 2025 and published in July 2025. The Apache JSPWiki team has addressed the issue in version 2.12.3, recommending all users upgrade to this or later versions to mitigate the risk. No public exploits have been reported yet, but the nature of XSS vulnerabilities means exploitation is straightforward once the vulnerability is known.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive information accessed via JSPWiki platforms. Since JSPWiki is often used for internal documentation, knowledge sharing, and collaboration, exploitation could lead to session hijacking, unauthorized access to internal resources, or leakage of confidential business information. The lack of required authentication or user interaction increases the risk of widespread exploitation, especially in organizations with publicly accessible JSPWiki instances. This could undermine trust in internal communication tools and potentially facilitate further attacks such as phishing or lateral movement within networks. The impact is particularly critical for sectors handling sensitive data, including finance, government, healthcare, and critical infrastructure. Additionally, the vulnerability could be leveraged to target European Union institutions or companies involved in cross-border collaborations, amplifying the potential damage.
Mitigation Recommendations
The primary and most effective mitigation is to upgrade Apache JSPWiki to version 2.12.3 or later, where the vulnerability has been fixed. Organizations should prioritize this upgrade in their patch management cycles. Beyond upgrading, administrators should implement strict input validation and output encoding on wiki markup inputs, especially for header links and markdown content, to prevent injection of malicious scripts. Employing Content Security Policy (CSP) headers can help mitigate the impact of any residual XSS by restricting script execution sources. Monitoring web server logs and application logs for unusual or suspicious wiki content submissions can help detect attempted exploitation. Additionally, educating users about the risks of clicking unknown or suspicious links within wiki pages can reduce the likelihood of successful attacks. For organizations with public-facing JSPWiki instances, consider restricting access or implementing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting JSPWiki.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2025-24853: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Apache Software Foundation Apache JSPWiki
Description
A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too. Apache JSPWiki users should upgrade to 2.12.3 or later.
AI-Powered Analysis
Technical Analysis
CVE-2025-24853 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting the Apache JSPWiki software maintained by the Apache Software Foundation. The vulnerability arises from improper neutralization of input during web page generation, specifically when users create header links using the wiki markup syntax or when content is parsed via the markdown parser. An attacker can craft a malicious request embedding JavaScript code within these inputs, which JSPWiki fails to sanitize properly. When a victim views the affected wiki page, the malicious script executes in their browser context, potentially allowing the attacker to steal sensitive information such as session cookies, authentication tokens, or other data accessible in the browser environment. The vulnerability does not require any privileges or user interaction to exploit, making it remotely exploitable over the network. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, but high integrity impact and no availability impact. The vulnerability was reserved in January 2025 and published in July 2025. The Apache JSPWiki team has addressed the issue in version 2.12.3, recommending all users upgrade to this or later versions to mitigate the risk. No public exploits have been reported yet, but the nature of XSS vulnerabilities means exploitation is straightforward once the vulnerability is known.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive information accessed via JSPWiki platforms. Since JSPWiki is often used for internal documentation, knowledge sharing, and collaboration, exploitation could lead to session hijacking, unauthorized access to internal resources, or leakage of confidential business information. The lack of required authentication or user interaction increases the risk of widespread exploitation, especially in organizations with publicly accessible JSPWiki instances. This could undermine trust in internal communication tools and potentially facilitate further attacks such as phishing or lateral movement within networks. The impact is particularly critical for sectors handling sensitive data, including finance, government, healthcare, and critical infrastructure. Additionally, the vulnerability could be leveraged to target European Union institutions or companies involved in cross-border collaborations, amplifying the potential damage.
Mitigation Recommendations
The primary and most effective mitigation is to upgrade Apache JSPWiki to version 2.12.3 or later, where the vulnerability has been fixed. Organizations should prioritize this upgrade in their patch management cycles. Beyond upgrading, administrators should implement strict input validation and output encoding on wiki markup inputs, especially for header links and markdown content, to prevent injection of malicious scripts. Employing Content Security Policy (CSP) headers can help mitigate the impact of any residual XSS by restricting script execution sources. Monitoring web server logs and application logs for unusual or suspicious wiki content submissions can help detect attempted exploitation. Additionally, educating users about the risks of clicking unknown or suspicious links within wiki pages can reduce the likelihood of successful attacks. For organizations with public-facing JSPWiki instances, consider restricting access or implementing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting JSPWiki.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2025-01-25T20:03:15.418Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 688b2db3ad5a09ad00b4fe1d
Added to database: 7/31/2025, 8:47:47 AM
Last enriched: 11/4/2025, 9:43:49 PM
Last updated: 12/12/2025, 9:11:58 AM
Views: 85
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12960: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in iworks Simple CSV Table
MediumCVE-2025-67731: CWE-400: Uncontrolled Resource Consumption in Aarondoran servify-express
HighCVE-2025-67726: CWE-834: Excessive Iteration in tornadoweb tornado
HighCVE-2025-67730: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in frappe lms
MediumCVE-2025-4970: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bannersky BSK PDF Manager
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.