CVE-2022-28730: Apache JSPWiki XSS due to incomplete patch for CVE-2021-40369
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.97262%
CWE
Published
8/5/2022
Updated
1/31/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.jspwiki:jspwiki-main | maven | < 2.11.3 | 2.11.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the DenouncePlugin's handling of user-controlled URLs, as explicitly referenced in both CVE descriptions. The AJAXPreview.jsp
endpoint is the attack vector, but the root cause is the plugin's rendering logic. The previous CVE-2021-40369 involved similar insufficient sanitization in this plugin, and the advisory confirms the patch was incomplete. While exact code isn't available, the pattern matches classic XSS vulnerabilities in plugin rendering methods that handle untrusted input without proper escaping.