{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-24853","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","state":"PUBLISHED","assignerShortName":"apache","dateReserved":"2025-01-25T20:03:15.418Z","datePublished":"2025-07-31T08:42:06.453Z","dateUpdated":"2025-11-04T21:09:43.620Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Apache JSPWiki","vendor":"Apache Software Foundation","versions":[{"lessThanOrEqual":"2.12.2","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"The issue was discovered by XBOW (https://github.com/xbow-security, https://xbow.com)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>A carefully crafted request when creating a header link using the \nwiki markup syntax, which could allow the attacker to execute javascript\n in the victim's browser and get some sensitive information about the \nvictim.\n</p>\n<p>Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too.</p><p>Apache JSPWiki users should upgrade to 2.12.3 or later.<br></p><br>"}],"value":"A carefully crafted request when creating a header link using the \nwiki markup syntax, which could allow the attacker to execute javascript\n in the victim's browser and get some sensitive information about the \nvictim.\n\n\n\nFurther research by the JSPWiki team showed that the markdown parser allowed this kind of attack too.\n\nApache JSPWiki users should upgrade to 2.12.3 or later."}],"metrics":[{"other":{"content":{"text":"Medium"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2025-07-31T08:42:06.453Z"},"references":[{"tags":["vendor-advisory"],"url":"https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2025-24853"}],"source":{"discovery":"UNKNOWN"},"title":"Apache JSPWiki: Cross-Site Scripting (XSS) in JSPWiki Header Link processing","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-07-31T13:39:02.510980Z","id":"CVE-2025-24853","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-31T17:55:11.018Z"}},{"title":"CVE Program Container","references":[{"url":"http://www.openwall.com/lists/oss-security/2025/07/30/2"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T21:09:43.620Z"}}]}}