User Group Privilege Escalation
Description
A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the email associated with the attacked account, and then a reset password request from the login page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CSRF in Apache JSPWiki Image plugin allows group privilege escalation and email modification, enabling account takeover.
The vulnerability is a Cross-Site Request Forgery (CSRF) in the Image plugin of Apache JSPWiki versions before 2.11.3. The plugin does not enforce proper anti-CSRF tokens, allowing an attacker to craft a malicious request that, when executed by an authenticated user, performs unauthorized actions on behalf of that user [1][3].
To exploit this, an attacker must trick an authenticated JSPWiki user into interacting with a crafted invocation on the Image plugin. This can be achieved via social engineering, such as embedding a malicious image or link in a wiki page or email. No additional privileges are required beyond the victim's session [1][3].
Successful exploitation enables the attacker to escalate the group privileges of their own account, modify the email associated with the victim's account, and then initiate a password reset from the login page. This effectively results in full account takeover and privilege escalation within the wiki [1][3].
The Apache Software Foundation has released JSPWiki 2.11.3, which fixes the CSRF vulnerability. Users are strongly advised to upgrade to this version or later. No workarounds have been provided [3]. The issue was discovered by Huiseong Seo (t0rchwo0d) [3].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.jspwiki:jspwiki-mainMaven | < 2.11.3 | 2.11.3 |
Affected products
2- Apache Software Foundation/Apache JSPWikiv5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-jp3m-p26h-mm7vghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-34158ghsaADVISORY
- jspwiki-wiki.apache.org/Wiki.jspghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.