Cross-site Scripting in org.owasp.esapi:esapi -- antisamy-esapi.xml configuration file
Description
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the antisamy-esapi.xml configuration file that can cause "javascript:" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the antisamy-esapi.xml configuration files to change the "onsiteURL" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.owasp.esapi:esapiMaven | < 2.3.0.0 | 2.3.0.0 |
Affected products
1- Range: <= 2.2.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- github.com/advisories/GHSA-q77q-vx4q-xx6qghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-24891ghsaADVISORY
- github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdfghsaWEB
- github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txtghsaWEB
- github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-q77q-vx4q-xx6qghsaWEB
- lists.debian.org/debian-lts-announce/2025/07/msg00010.htmlghsaWEB
- security.netapp.com/advisory/ntap-20230127-0014ghsaWEB
- www.oracle.com/security-alerts/cpujul2022.htmlghsaWEB
- security.netapp.com/advisory/ntap-20230127-0014/mitre
News mentions
0No linked articles in our index yet.