VYPR
Moderate severityNVD Advisory· Published Aug 4, 2022· Updated Aug 3, 2024

Apache JSPWiki Cross-site scripting vulnerability on WeblogPlugin

CVE-2022-28732

Description

A carefully crafted request on WeblogPlugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.3 or later.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache JSPWiki WeblogPlugin is vulnerable to stored cross-site scripting (XSS) via a crafted request, enabling JavaScript execution in a victim's browser and potential sensitive data theft.

Description

CVE-2022-28732 is a cross-site scripting (XSS) vulnerability found in the WeblogPlugin component of Apache JSPWiki. The issue arises when a carefully crafted request is processed by the plugin, which fails to properly sanitize user-supplied input before reflecting it in the page. This allows an attacker to inject arbitrary JavaScript or HTML into the wiki interface [1][3].

Exploitation

An attacker can exploit this vulnerability by sending a malicious request to a JSPWiki instance running version 2.11.2 or earlier. No authentication is explicitly required beyond typical web access to the wiki, as the crafted request can be delivered via a link or embedded in a page that a victim views. The attacker must craft the request to be processed by WeblogPlugin, which then renders the malicious payload in a way that executes in the context of the victim's browser session [2][3].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the victim's browser. This can lead to information disclosure, such as reading cookies, session tokens, or other sensitive data available to the wiki application. The attacker could also perform actions on behalf of the victim, potentially escalating privileges or modifying wiki content [1][3].

Mitigation

The vulnerability is fixed in Apache JSPWiki version 2.11.3 and later. Users are strongly advised to upgrade immediately. There is no mention of a workaround for older versions. The issue was reported by Wang Ran from JDArmy [3].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.jspwiki:jspwiki-mainMaven
< 2.11.32.11.3

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.