CVE-2025-27867

5.6 MEDIUM

📋 TL;DR

This is a cross-site scripting (XSS) vulnerability in Apache Felix HTTP Webconsole Plugin that allows attackers to inject malicious scripts into web pages. It affects users of Apache Felix HTTP Webconsole Plugin versions 1.X through 1.2.0. Successful exploitation could lead to session hijacking, credential theft, or unauthorized actions.

💻 Affected Systems

Products:
  • Apache Felix HTTP Webconsole Plugin
Versions: 1.X through 1.2.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Apache Felix HTTP Webconsole Plugin installed and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains administrative access to the Felix Webconsole, potentially compromising the entire OSGi container and deployed applications.

🟠

Likely Case

Session hijacking, credential theft, or unauthorized actions within the Webconsole interface.

🟢

If Mitigated

Limited impact if Webconsole is not exposed to untrusted users and proper input validation is implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity, but authentication to the Webconsole is required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.2

Vendor Advisory: https://lists.apache.org/thread/y83f2rvm8bccr5ctgv7mzxd69p6f77dp

Restart Required: Yes

Instructions:

1. Download Apache Felix HTTP Webconsole Plugin version 1.2.2 from official Apache repositories. 2. Replace the vulnerable plugin JAR file in your Felix installation. 3. Restart the OSGi container or Felix framework.

🔧 Temporary Workarounds

Restrict Webconsole Access

all

Limit access to the Felix Webconsole to trusted IP addresses only.

Configure firewall rules or web server access controls to restrict access to the Webconsole port (typically 8080).

Disable Webconsole

all

Temporarily disable the Webconsole plugin if not required.

Stop the Felix framework, remove or rename the webconsole plugin JAR file, then restart.

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers for the Webconsole.
  • Ensure all users with Webconsole access have strong, unique passwords and MFA enabled.

🔍 How to Verify

Check if Vulnerable:

Check the version of the Apache Felix HTTP Webconsole Plugin JAR file in your Felix installation.

Check Version:

Check the JAR file name or manifest: 'unzip -p org.apache.felix.http.webconsole-*.jar META-INF/MANIFEST.MF | grep Bundle-Version' on Linux, or inspect JAR properties on Windows.

Verify Fix Applied:

Verify that the plugin version is 1.2.2 or higher after patching.

📡 Detection & Monitoring

Log Indicators:

  • Unusual or malicious script patterns in Webconsole access logs, unexpected authentication attempts.

Network Indicators:

  • HTTP requests containing script tags or JavaScript payloads to the Webconsole endpoint.

SIEM Query:

source="felix-webconsole" AND (url="*<script>*" OR method="POST" AND status=200 AND size>normal)

🔗 References

📤 Share & Export