First published: Fri Feb 25 2022(Updated: )
A carefully crafted user preferences for submission could trigger an XSS vulnerability on Apache JSPWiki, related to the user preferences screen, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.2 or later.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache JSPWiki | <2.11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this XSS vulnerability is CVE-2022-24948.
The severity of CVE-2022-24948 is medium, with a CVSS score of 6.1.
This vulnerability could allow an attacker to execute JavaScript in the victim's browser and potentially gain access to sensitive information about the victim.
To protect your Apache JSPWiki installation, make sure to upgrade to a version above 2.11.2, as this vulnerability has been patched in later versions.
You can find more information about CVE-2022-24948 on the Openwall mailing list and the Apache JSPWiki mailing list.