Vulnerability Description
A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the email associated with the attacked account, and then a reset password request from the login page.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Jspwiki | < 2.11.3 |
Related Weaknesses (CWE)
References
- https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-34158Vendor Advisory
- https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-34158Vendor Advisory
FAQ
What is CVE-2022-34158?
CVE-2022-34158 is a vulnerability with a CVSS score of 8.8 (HIGH). A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Furthe...
How severe is CVE-2022-34158?
CVE-2022-34158 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-34158?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Jspwiki.