Apache JSPWiki: Cross-site scripting vulnerability on upload page
Description
XSS in Upload page in Apache JSPWiki 2.12.1 and priors allows the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.2 or later.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache JSPWiki 2.12.1 and earlier have a stored XSS vulnerability on the Upload page, allowing script execution and sensitive data theft.
Vulnerability
Overview Apache JSPWiki, a Java-based wiki engine, contains a cross-site scripting (XSS) vulnerability in its Upload page. The issue affects versions up to and including 2.12.1, where a carefully crafted request can inject malicious JavaScript into the page [2]. This stored XSS occurs because user-supplied content is not properly sanitized before being served to other users [3].
Attack
Vector and Prerequisites An attacker can exploit this vulnerability by uploading a specially crafted file or payload via the Upload page. The attack requires the victim to visit the affected wiki page after the malicious content is stored. No authentication is needed for the initial upload, but the victim must be a user of the wiki to have the injected script executed in their browser [3][4].
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the victim's browser within the context of the JSPWiki application. This can lead to the theft of sensitive information, such as session cookies, authentication tokens, or other personal data accessible through the victim's session [1][3]. The moderate severity rating reflects the need for victim interaction but highlights the risk to confidentiality.
Mitigation
The vulnerability is fixed in Apache JSPWiki version 2.12.2. Users are strongly advised to upgrade immediately, as no workarounds have been provided. The issue was reported by sonnh from Vietnam National Cyber Security Technology Corporation and is publicly documented [4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.jspwiki:jspwiki-mainMaven | < 2.12.2 | 2.12.2 |
Affected products
2- Apache Software Foundation/Apache JSPWikiv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-36gf-vpj2-j42wghsaADVISORY
- jspwiki-wiki.apache.org/Wiki.jspghsavendor-advisoryWEB
- lists.apache.org/thread/gfms8gbncqqkj52p861b8fnsypwsl1d5ghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2024-27136ghsaADVISORY
- www.openwall.com/lists/oss-security/2024/06/23/3ghsaWEB
News mentions
0No linked articles in our index yet.