CVE-2022-28730
moderate-risk
Published 2022-08-04
A carefully crafted request on AJAXPreview.jsp could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. This vulnerability leverages CVE-2021-40369, where the Denounce plugin dangerously renders user-supplied URLs. Upon re-testing CVE-2021-40369, it appears that the patch was incomplete as it was still possible to insert malicious input via the Denounce plugin. Apache JSPWiki users should upgrade to 2.11.3 or later.
Do I need to act?
!
11.3% chance of exploitation in next 30 days
EPSS score — higher than 89% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.1/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (2)
Vendor Advisory
https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732
Vendor Advisory
https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732
39
/ 100
moderate-risk
Severity
23/34 · High
Exploitability
11/34 · Low
Exposure
5/34 · Minimal