VYPR
Moderate severityNVD Advisory· Published Sep 23, 2019· Updated Aug 4, 2024

CVE-2019-10090

CVE-2019-10090

Description

On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the plain editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache JSPWiki up to 2.11.0.M4 has a stored XSS via crafted plugin link invocation in the plain editor, allowing JavaScript execution.

Vulnerability

Overview

CVE-2019-10090 is a cross-site scripting (XSS) vulnerability in Apache JSPWiki versions up to 2.11.0.M4. The flaw resides in the 'plain editor' component, where a carefully crafted plugin link invocation can be used to inject arbitrary JavaScript code [1][2]. The root cause is insufficient sanitization of user-supplied input within the plugin link functionality, enabling an attacker to break out of the intended HTML context.

Exploitation

Scenario

An attacker who can create or edit wiki content—typically an authenticated user with appropriate permissions—can embed a malicious plugin link within a page. No additional authentication or network access is required beyond standard wiki editing capabilities. When other users view the crafted page, the injected payload executes in their browser within the session's security context of the JSPWiki application [2].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the victim's browser. This can be used to steal sensitive information such as session cookies, page content, or authentication tokens, and to perform actions on behalf of the victim within the wiki. The vulnerability is rated as Medium severity, reflecting the need for authenticated access yet the potential for data compromise [1][2].

Mitigation

The Apache JSPWiki project has released version 2.11.0.M5, which fixes this vulnerability. Users are strongly advised to upgrade to this version or later. No workarounds have been documented for unpatched installations [2].

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.jspwiki:jspwiki-warMaven
>= 2.9.0, < 2.11.0.M52.11.0.M5

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.