VYPR
Moderate severityNVD Advisory· Published Apr 30, 2019· Updated Aug 4, 2024

CVE-2019-0213

CVE-2019-0213

Description

In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Archiva before 2.2.4 allows stored XSS via admin-configurable entries like the logo URL.

Root

Cause Apache Archiva versions 2.0.0 through 2.2.3 (and the unsupported 1.x series) contain a stored cross-site scripting (XSS) vulnerability in central configuration entries. Specifically, the logo URL field and similar UI configuration values do not properly sanitize user input, allowing an attacker to inject malicious JavaScript code that is stored on the server [1][4].

Attack

Vector Exploitation requires admin-level privileges to modify the configuration, or an attacker would need to have already compromised the communication channel between the browser and the Archiva server. This limits the attack surface to users with administrative roles or those capable of man-in-the-middle attacks [1][4]. The stored XSS then executes in the context of other administrators or users who view the affected configuration pages.

Impact

An attacker who successfully injects XSS can perform actions on behalf of other authenticated users, potentially leading to data theft, session hijacking, or further compromise of the Archiva server. The vulnerability is considered low severity due to the prerequisite of admin credentials, but it is still a valid security risk in multi-tenant or shared administrator scenarios [1][4].

Mitigation

Apache has released Archiva version 2.2.4, which fixes the stored XSS vulnerability. Users are strongly advised to upgrade to this version or later. No binary patches are provided for individual vulnerabilities; upgrading the entire application is the recommended remediation [3][4].

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.archiva:archivaMaven
< 2.2.42.2.4

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

15

News mentions

0

No linked articles in our index yet.