VYPR

Maven package

org.apache.jspwiki/jspwiki-main

pkg:maven/org.apache.jspwiki/jspwiki-main

Vulnerabilities (18)

  • CVE-2025-24854Jul 31, 2025
    affected < 2.12.3fixed 2.12.3

    A carefully crafted request using the Image plugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade t

  • CVE-2025-24853Jul 31, 2025
    affected < 2.12.3fixed 2.12.3

    A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markd

  • CVE-2024-27136Jun 24, 2024
    affected < 2.12.2fixed 2.12.2

    XSS in Upload page in Apache JSPWiki 2.12.1 and priors allows the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.2 or later.

  • CVE-2022-46907May 25, 2023
    affected < 2.12.0fixed 2.12.0

    A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2

  • CVE-2022-34158Aug 4, 2022
    affected < 2.11.3fixed 2.11.3

    A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the

  • CVE-2022-28732Aug 4, 2022
    affected < 2.11.3fixed 2.11.3

    A carefully crafted request on WeblogPlugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.3 or lat

  • CVE-2022-28731Aug 4, 2022
    affected < 2.11.3fixed 2.11.3

    A carefully crafted request on UserPreferences.jsp could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow the attacker to modify the email associated with the attacked account, and then a reset password request from the login page.

  • CVE-2022-28730Aug 4, 2022
    affected < 2.11.3fixed 2.11.3

    A carefully crafted request on AJAXPreview.jsp could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. This vulnerability leverages CVE-2021-40369, wher

  • CVE-2022-27166Aug 4, 2022
    affected < 2.11.3fixed 2.11.3

    A carefully crafted request on XHRHtml2Markup.jsp could trigger an XSS vulnerability on Apache JSPWiki up to and including 2.11.2, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.

  • CVE-2022-24948Feb 25, 2022
    affected < 2.11.2fixed 2.11.2

    A carefully crafted user preferences for submission could trigger an XSS vulnerability on Apache JSPWiki, related to the user preferences screen, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apac

  • CVE-2022-24947Feb 25, 2022
    affected < 2.11.2fixed 2.11.2

    Apache JSPWiki user preferences form is vulnerable to CSRF attacks, which can lead to account takeover. Apache JSPWiki users should upgrade to 2.11.2 or later.

  • CVE-2021-44140Nov 24, 2021
    affected < 2.11.0fixed 2.11.0

    Remote attackers may delete arbitrary files in a system hosting a JSPWiki instance, versions up to 2.11.0.M8, by using a carefuly crafted http request on logout, given that those files are reachable to the user running the JSPWiki instance. Apache JSPWiki users should upgrade to

  • CVE-2021-40369Nov 24, 2021
    affected < 2.11.0fixed 2.11.0

    A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users

  • CVE-2019-12407Sep 23, 2019
    affected < 2.11.0.M5fixed 2.11.0.M5

    On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the remember parameter on some of the JSPs, which could allow the attacker to execute javascript in the victim's browser and get

  • CVE-2019-10078May 20, 2019
    affected >= 2.9.0, < 2.11.0.M4fixed 2.11.0.M4

    A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. Initial reporting indicated ReferredPagesPlugin, but further analysis showed that multiple plugins were vulnerable.

  • CVE-2019-10077May 20, 2019
    affected >= 2.9.0, < 2.11.0.M4fixed 2.11.0.M4

    A carefully crafted InterWiki link could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.

  • CVE-2019-10076May 20, 2019
    affected >= 2.9.0, < 2.11.0.M4fixed 2.11.0.M4

    A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.

  • CVE-2019-0224Mar 28, 2019
    affected >= 2.9.0, < 2.11.0.M3fixed 2.11.0.M3

    In Apache JSPWiki 2.9.0 to 2.11.0.M2, a carefully crafted URL could execute javascript on another user's session. No information could be saved on the server or jspwiki database, nor would an attacker be able to execute js on someone else's browser; only on its own browser.