First published: Thu May 25 2023(Updated: )
A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.0 or later.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache JSPWiki | <2.12.0 | |
maven/org.apache.jspwiki:jspwiki-war | <2.12.0 | 2.12.0 |
maven/org.apache.jspwiki:jspwiki-main | <2.12.0 | 2.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46907 is a vulnerability in Apache JSPWiki that allows an attacker to execute JavaScript in a victim's browser and obtain sensitive information.
CVE-2022-46907 can be exploited by sending a carefully crafted request to several JSPWiki plugins.
The severity of CVE-2022-46907 is medium with a CVSS score of 6.1.
To fix CVE-2022-46907, Apache JSPWiki users should upgrade to version 2.12.0 or later.
More information about CVE-2022-46907 can be found at the following references: [1], [2], [3].