Apache JSPWiki Cross-site scripting vulnerability on WeblogPlugin
Description
A carefully crafted request on WeblogPlugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.3 or later.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache JSPWiki WeblogPlugin is vulnerable to stored cross-site scripting (XSS) via a crafted request, enabling JavaScript execution in a victim's browser and potential sensitive data theft.
Description
CVE-2022-28732 is a cross-site scripting (XSS) vulnerability found in the WeblogPlugin component of Apache JSPWiki. The issue arises when a carefully crafted request is processed by the plugin, which fails to properly sanitize user-supplied input before reflecting it in the page. This allows an attacker to inject arbitrary JavaScript or HTML into the wiki interface [1][3].
Exploitation
An attacker can exploit this vulnerability by sending a malicious request to a JSPWiki instance running version 2.11.2 or earlier. No authentication is explicitly required beyond typical web access to the wiki, as the crafted request can be delivered via a link or embedded in a page that a victim views. The attacker must craft the request to be processed by WeblogPlugin, which then renders the malicious payload in a way that executes in the context of the victim's browser session [2][3].
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the victim's browser. This can lead to information disclosure, such as reading cookies, session tokens, or other sensitive data available to the wiki application. The attacker could also perform actions on behalf of the victim, potentially escalating privileges or modifying wiki content [1][3].
Mitigation
The vulnerability is fixed in Apache JSPWiki version 2.11.3 and later. Users are strongly advised to upgrade immediately. There is no mention of a workaround for older versions. The issue was reported by Wang Ran from JDArmy [3].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.jspwiki:jspwiki-mainMaven | < 2.11.3 | 2.11.3 |
Affected products
2- Apache Software Foundation/Apache JSPWikiv5Range: Apache JSPWiki
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-hph8-29xw-qfxxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-28732ghsaADVISORY
- jspwiki-wiki.apache.org/Wiki.jspghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.