CVE-2019-10090
Description
On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the plain editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache JSPWiki up to 2.11.0.M4 has a stored XSS via crafted plugin link invocation in the plain editor, allowing JavaScript execution.
Vulnerability
Overview
CVE-2019-10090 is a cross-site scripting (XSS) vulnerability in Apache JSPWiki versions up to 2.11.0.M4. The flaw resides in the 'plain editor' component, where a carefully crafted plugin link invocation can be used to inject arbitrary JavaScript code [1][2]. The root cause is insufficient sanitization of user-supplied input within the plugin link functionality, enabling an attacker to break out of the intended HTML context.
Exploitation
Scenario
An attacker who can create or edit wiki content—typically an authenticated user with appropriate permissions—can embed a malicious plugin link within a page. No additional authentication or network access is required beyond standard wiki editing capabilities. When other users view the crafted page, the injected payload executes in their browser within the session's security context of the JSPWiki application [2].
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the victim's browser. This can be used to steal sensitive information such as session cookies, page content, or authentication tokens, and to perform actions on behalf of the victim within the wiki. The vulnerability is rated as Medium severity, reflecting the need for authenticated access yet the potential for data compromise [1][2].
Mitigation
The Apache JSPWiki project has released version 2.11.0.M5, which fixes this vulnerability. Users are strongly advised to upgrade to this version or later. No workarounds have been documented for unpatched installations [2].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.jspwiki:jspwiki-warMaven | >= 2.9.0, < 2.11.0.M5 | 2.11.0.M5 |
Affected products
2- Apache/Apache JSPWikidescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-g6ww-2x43-h963ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-10090ghsaADVISORY
- jspwiki-wiki.apache.org/Wiki.jspghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.