Description
A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.0 or later.
Remediation
References
https://lists.apache.org/thread/1m0mkq2nttx8tn94m11mytn4f0tv1504
http://www.openwall.com/lists/oss-security/2023/05/25/1
Related Vulnerabilities
CVE-2023-25158 Vulnerability in maven package org.geotools.jdbc:gt-jdbc-mysql
CVE-2023-36542 Vulnerability in maven package org.apache.nifi:nifi-standard-processors
CVE-2022-34194 Vulnerability in maven package org.jenkins-ci.plugins:readonly-parameters
CVE-2021-39239 Vulnerability in maven package org.apache.jena:jena-core
CVE-2020-7009 Vulnerability in maven package org.elasticsearch:elasticsearch