CVE-2025-24853: Apache JSPWiki Cross-Site Scripting (XSS) Vulnerability via Header Link Rendering
A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim’s browser and get some sensitive information about the victim.
Further research by the JSPWiki team showed that the markdown parser allowed this kind of attack too.
Apache JSPWiki users should upgrade to 2.12.3 or later.
References
- github.com/advisories/GHSA-rrff-chj9-w4c7
- github.com/apache/jspwiki
- github.com/apache/jspwiki/commit/402f9a18b57dd910afba0139e6d3112d54ad650a
- github.com/apache/jspwiki/commit/f4089cb6d53223c2c291196ba687753a8b0422cf
- github.com/apache/jspwiki/pull/376
- jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2025-24853
- nvd.nist.gov/vuln/detail/CVE-2025-24853
Code Behaviors & Features
Detect and mitigate CVE-2025-24853 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →