CVE-2025-24853

Severity
7.5HIGH
EPSS
0.3%
top 50.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 31

Description

A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too. Apache JSPWiki users should upgrade to 2.12.3 or later.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

🔴Vulnerability Details

3
CVEList
Apache JSPWiki: Cross-Site Scripting (XSS) in JSPWiki Header Link processing2025-07-31
GHSA
Apache JSPWiki Cross-Site Scripting (XSS) Vulnerability via Header Link Rendering2025-07-31
OSV
Apache JSPWiki Cross-Site Scripting (XSS) Vulnerability via Header Link Rendering2025-07-31
CVE-2025-24853 (HIGH CVSS 7.5) | A carefully crafted request when cr | cvebase.io