On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
                
            References
                    | Link | Resource | 
|---|---|
| https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10089 | Vendor Advisory | 
| https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10089 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 04:18
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10089 - Vendor Advisory | 
Information
                Published : 2019-09-23 15:15
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10089
Mitre link : CVE-2019-10089
CVE.ORG link : CVE-2019-10089
JSON object : View
Products Affected
                apache
- jspwiki
 
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
