CVE-2022-24891: Cross-site Scripting in org.owasp.esapi:esapi
(updated )
There is a potential for an XSS vulnerability in ESAPI caused by a incorrect regular expression for “onsiteURL” in the antisamy-esapi.xml configuration file that can cause URLs with the “javascript:” scheme to NOT be sanitized. See the reference below for full details.
References
- github.com/ESAPI/esapi-java-legacy
- github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf
- github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt
- github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-q77q-vx4q-xx6q
- github.com/advisories/GHSA-q77q-vx4q-xx6q
- lists.debian.org/debian-lts-announce/2025/07/msg00010.html
- nvd.nist.gov/vuln/detail/CVE-2022-24891
- security.netapp.com/advisory/ntap-20230127-0014
- www.oracle.com/security-alerts/cpujul2022.html
Code Behaviors & Features
Detect and mitigate CVE-2022-24891 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →