CVE-2025-25247:
Apache Felix Webconsole: XSS in services console
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.02634%
CWE
Published
2/10/2025
Updated
2/10/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.felix:org.apache.felix.webconsole | maven | >= 4.0.0, < 4.9.10 | 4.9.10 |
org.apache.felix:org.apache.felix.webconsole | maven | >= 5.0.0, < 5.0.10 | 5.0.10 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from line 469 in ServicesServlet.java
where user-controlled 'filter' input was encoded for HTML content but placed in a JavaScript context. The patch changed the encoding method to Encode.forJavaScript
, indicating the original HTML encoding was insufficient for the JavaScript execution context. The renderContent()
method handles HTTP response generation, making it the logical location for output encoding vulnerabilities. The direct correlation between the vulnerability description, CWE-79 classification, and the specific encoding fix in the commit confirms this function's role in the XSS vulnerability.