VYPR
Moderate severityNVD Advisory· Published Jul 31, 2025· Updated Nov 4, 2025

Apache JSPWiki: Cross-Site Scripting (XSS) in JSPWiki Image plugin

CVE-2025-24854

Description

A carefully crafted request using the Image plugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.

Apache JSPWiki users should upgrade to 2.12.3 or later.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2025-24854 is a cross-site scripting (XSS) vulnerability in Apache JSPWiki's Image plugin, allowing an attacker to execute JavaScript and steal sensitive information from victims.

Vulnerability

Overview CVE-2025-24854 is a cross-site scripting (XSS) flaw in Apache JSPWiki, affecting versions up to 2.12.2 [1][3][4]. The vulnerability resides in the Image plugin, where a carefully crafted request can inject malicious JavaScript [1][3]. This occurs because user input is not properly sanitized or validated before being rendered in the browser [1][3][4].

Exploitation

Method An attacker can exploit this by sending a specially crafted request that includes malicious script content via the Image plugin [1][3]. The attack requires no special privileges—any user with the ability to insert images or trigger the plugin's endpoint could potentially be exploited [3][4]. The injected script executes in the context of the victim's browser session, making it a classic stored or reflected XSS attack [1][3].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the victim's browser, leading to extraction of sensitive information such as session cookies, authentication tokens, or other personal data [1][3][4]. This could result in account takeover, data leakage, or privilege escalation within the JSPWiki application [1][3][4].

Mitigation

Apache JSPWiki users should immediately upgrade to version 2.12.3 or later, which contains the fix for this vulnerability [1][4]. No workarounds have been provided, and the vendor recommends updating as the sole mitigation [3][4]. The vulnerability was independently discovered by XBOW and Hamed Kohi [3][4].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.jspwiki:jspwiki-mainMaven
< 2.12.32.12.3

Affected products

2
  • Jspwiki/Jspwikillm-fuzzy
    Range: <2.12.3
  • Apache Software Foundation/Apache JSPWikiv5
    Range: 0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.