-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from unescaped output of the 'password' parameter in setup-datasource-standard.jsp. The patch adds fn:escapeXml() to sanitize output. The vulnerable code would execute in the auto-generated _jspService method of the compiled JSP servlet, which handles request processing and response rendering. This is evidenced by the direct parameter interpolation in the pre-patch version using `<%= scriptlet syntax without escaping.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.igniterealtime.openfire:parent | maven | < 4.4.2 | 4.4.2 |
Ongoing coverage of React2Shell