VYPR
High severityNVD Advisory· Published Aug 4, 2022· Updated Aug 3, 2024

User Group Privilege Escalation

CVE-2022-34158

Description

A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the email associated with the attacked account, and then a reset password request from the login page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CSRF in Apache JSPWiki Image plugin allows group privilege escalation and email modification, enabling account takeover.

The vulnerability is a Cross-Site Request Forgery (CSRF) in the Image plugin of Apache JSPWiki versions before 2.11.3. The plugin does not enforce proper anti-CSRF tokens, allowing an attacker to craft a malicious request that, when executed by an authenticated user, performs unauthorized actions on behalf of that user [1][3].

To exploit this, an attacker must trick an authenticated JSPWiki user into interacting with a crafted invocation on the Image plugin. This can be achieved via social engineering, such as embedding a malicious image or link in a wiki page or email. No additional privileges are required beyond the victim's session [1][3].

Successful exploitation enables the attacker to escalate the group privileges of their own account, modify the email associated with the victim's account, and then initiate a password reset from the login page. This effectively results in full account takeover and privilege escalation within the wiki [1][3].

The Apache Software Foundation has released JSPWiki 2.11.3, which fixes the CSRF vulnerability. Users are strongly advised to upgrade to this version or later. No workarounds have been provided [3]. The issue was discovered by Huiseong Seo (t0rchwo0d) [3].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.jspwiki:jspwiki-mainMaven
< 2.11.32.11.3

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.