CVE-2019-0213
Description
In Apache Archiva before 2.2.4, it may be possible to store malicious XSS code into central configuration entries, i.e. the logo URL. The vulnerability is considered as minor risk, as only users with admin role can change the configuration, or the communication between the browser and the Archiva server must be compromised.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Archiva before 2.2.4 allows stored XSS via admin-configurable entries like the logo URL.
Root
Cause Apache Archiva versions 2.0.0 through 2.2.3 (and the unsupported 1.x series) contain a stored cross-site scripting (XSS) vulnerability in central configuration entries. Specifically, the logo URL field and similar UI configuration values do not properly sanitize user input, allowing an attacker to inject malicious JavaScript code that is stored on the server [1][4].
Attack
Vector Exploitation requires admin-level privileges to modify the configuration, or an attacker would need to have already compromised the communication channel between the browser and the Archiva server. This limits the attack surface to users with administrative roles or those capable of man-in-the-middle attacks [1][4]. The stored XSS then executes in the context of other administrators or users who view the affected configuration pages.
Impact
An attacker who successfully injects XSS can perform actions on behalf of other authenticated users, potentially leading to data theft, session hijacking, or further compromise of the Archiva server. The vulnerability is considered low severity due to the prerequisite of admin credentials, but it is still a valid security risk in multi-tenant or shared administrator scenarios [1][4].
Mitigation
Apache has released Archiva version 2.2.4, which fixes the stored XSS vulnerability. Users are strongly advised to upgrade to this version or later. No binary patches are provided for individual vulnerabilities; upgrading the entire application is the recommended remediation [3][4].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.archiva:archivaMaven | < 2.2.4 | 2.2.4 |
Affected products
2- Apache/Apache Archivav5Range: All versions prior to version 2.2.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
15- github.com/advisories/GHSA-cqcf-4g4h-rghfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-0213ghsaADVISORY
- archiva.apache.org/security.htmlghsax_refsource_MISCWEB
- packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.htmlghsax_refsource_MISCWEB
- www.openwall.com/lists/oss-security/2019/04/30/7ghsamailing-listx_refsource_MLISTWEB
- www.securityfocus.com/bid/108123ghsavdb-entryx_refsource_BIDWEB
- lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3%40%3Cusers.archiva.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3@%3Cusers.archiva.apache.org%3EghsaWEB
- lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d%40%3Cannounce.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d@%3Cannounce.apache.org%3EghsaWEB
- lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb%40%3Cissues.archiva.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3EghsaWEB
- lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97%40%3Cusers.maven.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97@%3Cusers.maven.apache.org%3EghsaWEB
- seclists.org/bugtraq/2019/Apr/47ghsamailing-listx_refsource_BUGTRAQWEB
News mentions
0No linked articles in our index yet.