Vulnerabilites related to WSO2 - WSO2 API Manager
CVE-2024-1440 (GCVE-0-2024-1440)
Vulnerability from cvelistv5
Published
2025-06-02 16:51
Modified
2025-06-02 17:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Summary
An open redirection vulnerability exists in multiple WSO2 products due to improper validation of the multi-option URL in the authentication endpoint when multi-option authentication is enabled. A malicious actor can craft a valid link that redirects users to an attacker-controlled site.
By exploiting this vulnerability, an attacker may trick users into visiting a malicious page, enabling phishing attacks to harvest sensitive information or perform other harmful actions.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 Identity Server |
Version: 5.10.0 < 5.10.0.278 Version: 5.11.0 < 5.11.0.347 Version: 6.0.0 < 6.0.0.185 Version: 6.1.0 < 6.1.0.145 Version: 7.0.0 < 7.0.0.30 |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-1440", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-02T17:06:49.114728Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-02T17:07:01.605Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.10.0.278", "status": "affected", "version": "5.10.0", "versionType": "custom" }, { "lessThan": "5.11.0.347", "status": "affected", "version": "5.11.0", "versionType": "custom" }, { "lessThan": "6.0.0.185", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.145", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "7.0.0.30", "status": "affected", "version": "7.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "3.1.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.1.0.262", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.2.0.344", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "4.0.0.296", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.10.0.298", "status": "affected", "version": "5.10.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking AM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.308", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking IAM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.327", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "packageName": "org.wso2.carbon.identity.framework:org.wso2.carbon.identity.application.authentication.endpoint.util", "product": "WSO2 Carbon Identity Application Authentication Endpoint(Utils)", "vendor": "WSO2", "versions": [ { "lessThan": "5.17.5.256", "status": "affected", "version": "5.17.5", "versionType": "custom" }, { "lessThan": "5.18.187.257", "status": "affected", "version": "5.18.187", "versionType": "custom" }, { "lessThan": "5.23.8.174", "status": "affected", "version": "5.23.8", "versionType": "custom" }, { "lessThan": "5.25.92.77", "status": "affected", "version": "5.25.92", "versionType": "custom" }, { "lessThan": "7.0.78.18", "status": "affected", "version": "7.0.78", "versionType": "custom" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "7.0.111", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An open redirection vulnerability exists in multiple WSO2 products due to improper validation of the multi-option URL in the authentication endpoint when multi-option authentication is enabled. A malicious actor can craft a valid link that redirects users to an attacker-controlled site.\u003cbr\u003e\u003cbr\u003eBy exploiting this vulnerability, an attacker may trick users into visiting a malicious page, enabling phishing attacks to harvest sensitive information or perform other harmful actions.\u003cbr\u003e" } ], "value": "An open redirection vulnerability exists in multiple WSO2 products due to improper validation of the multi-option URL in the authentication endpoint when multi-option authentication is enabled. A malicious actor can craft a valid link that redirects users to an attacker-controlled site.\n\nBy exploiting this vulnerability, an attacker may trick users into visiting a malicious page, enabling phishing attacks to harvest sensitive information or perform other harmful actions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-02T16:51:16.948Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3171/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Follow the instructions given on \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3171/#solution\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3...\u003c/a\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3171/#solution" } ], "source": { "advisory": "WSO2-2024-3171", "discovery": "INTERNAL" }, "title": "Open Redirection in Multiple WSO2 Products via Multi-Option Authentication Endpoint", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-1440", "datePublished": "2025-06-02T16:51:16.948Z", "dateReserved": "2024-02-12T09:53:51.193Z", "dateUpdated": "2025-06-02T17:07:01.605Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-7074 (GCVE-0-2024-7074)
Vulnerability from cvelistv5
Published
2025-06-02 16:42
Modified
2025-06-02 17:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-434 - Unrestricted Upload of File with Dangerous Type
Summary
An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server.
By leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 Enterprise Integrator |
Version: 6.0.0 < 6.0.0.21 Version: 6.1.0 < 6.1.0.38 Version: 6.1.1 < 6.1.1.42 Version: 6.2.0 < 6.2.0.61 Version: 6.3.0 < 6.3.0.69 Version: 6.4.0 < 6.4.0.96 Version: 6.5.0 < 6.5.0.102 Version: 6.6.0 < 6.6.0.198 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-7074", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-02T17:04:40.480620Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-02T17:05:49.920Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 Enterprise Integrator", "vendor": "WSO2", "versions": [ { "lessThan": "6.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "6.0.0.21", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.38", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "6.1.1.42", "status": "affected", "version": "6.1.1", "versionType": "custom" }, { "lessThan": "6.2.0.61", "status": "affected", "version": "6.2.0", "versionType": "custom" }, { "lessThan": "6.3.0.69", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "6.4.0.96", "status": "affected", "version": "6.4.0", "versionType": "custom" }, { "lessThan": "6.5.0.102", "status": "affected", "version": "6.5.0", "versionType": "custom" }, { "lessThan": "6.6.0.198", "status": "affected", "version": "6.6.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.28", "status": "affected", "version": "2.0.0", "versionType": "custom" }, { "lessThan": "2.1.0.38", "status": "affected", "version": "2.1.0", "versionType": "custom" }, { "lessThan": "2.2.0.57", "status": "affected", "version": "2.2.0", "versionType": "custom" }, { "lessThan": "2.5.0.83", "status": "affected", "version": "2.5.0", "versionType": "custom" }, { "lessThan": "2.6.0.143", "status": "affected", "version": "2.6.0", "versionType": "custom" }, { "lessThan": "3.0.0.162", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThan": "3.1.0.293", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.2.0.384", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.16", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.0.0.305", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.166", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.100", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.16", "status": "affected", "version": "4.3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "WSO2 Enterprise Service Bus", "vendor": "WSO2", "versions": [ { "lessThan": "4.9.0.10", "status": "affected", "version": "4.9.0", "versionType": "custom" }, { "lessThan": "5.0.0.28", "status": "affected", "version": "5.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "WSO2 Enterprise Mobility Manager", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.27", "status": "affected", "version": "2.2.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Micro Integrator", "vendor": "WSO2", "versions": [ { "lessThan": "1.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.0.0.49", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking AM", "vendor": "WSO2", "versions": [ { "lessThan": "1.3.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.3.0.132", "status": "affected", "version": "1.3.0", "versionType": "custom" }, { "lessThan": "1.4.0.135", "status": "affected", "version": "1.4.0", "versionType": "custom" }, { "lessThan": "1.5.0.137", "status": "affected", "version": "1.5.0", "versionType": "custom" }, { "lessThan": "2.0.0.342", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "packageName": "org.wso2.carbon.mediation:org.wso2.carbon.mediation.artifactuploader", "product": "WSO2 Carbon Synapse Artifact Uploader BE", "vendor": "WSO2", "versions": [ { "lessThan": "4.4.10.3", "status": "affected", "version": "4.4.10", "versionType": "custom" }, { "lessThan": "4.6.1.4", "status": "affected", "version": "4.6.1", "versionType": "custom" }, { "lessThan": "4.6.6.9", "status": "affected", "version": "4.6.6", "versionType": "custom" }, { "lessThan": "4.6.10.4", "status": "affected", "version": "4.6.10", "versionType": "custom" }, { "lessThan": "4.6.16.2", "status": "affected", "version": "4.6.16", "versionType": "custom" }, { "lessThan": "4.6.19.10", "status": "affected", "version": "4.6.19", "versionType": "custom" }, { "lessThan": "4.6.64.2", "status": "affected", "version": "4.6.64", "versionType": "custom" }, { "lessThan": "4.6.67.15", "status": "affected", "version": "4.6.67", "versionType": "custom" }, { "lessThan": "4.6.89.12", "status": "affected", "version": "4.6.89", "versionType": "custom" }, { "lessThan": "4.6.105.59", "status": "affected", "version": "4.6.105", "versionType": "custom" }, { "lessThan": "4.6.150.11", "status": "affected", "version": "4.6.150", "versionType": "custom" }, { "lessThan": "4.7.20.5", "status": "affected", "version": "4.7.20", "versionType": "custom" }, { "lessThan": "4.7.30.42", "status": "affected", "version": "4.7.30", "versionType": "custom" }, { "lessThan": "4.7.35.5", "status": "affected", "version": "4.7.35", "versionType": "custom" }, { "lessThan": "4.7.61.56", "status": "affected", "version": "4.7.61", "versionType": "custom" }, { "lessThan": "4.7.99.299", "status": "affected", "version": "4.7.99", "versionType": "custom" }, { "lessThan": "4.7.131.15", "status": "affected", "version": "4.7.131", "versionType": "custom" }, { "lessThan": "4.7.175.18", "status": "affected", "version": "4.7.175", "versionType": "custom" }, { "lessThan": "4.7.188.5", "status": "affected", "version": "4.7.188", "versionType": "custom" }, { "lessThan": "4.7.204.5", "status": "affected", "version": "4.7.204", "versionType": "custom" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "4.7.216", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Anonymous working with Trend Micro Zero Day Initiative" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server.\u003cbr\u003e\u003cbr\u003eBy leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users.\u003cbr\u003e" } ], "value": "An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server.\n\nBy leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-02T16:42:19.264Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3566/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Follow the instructions given on \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3566/#solution\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3...\u003c/a\u003e \u003cbr\u003e\u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3566/#solution" } ], "source": { "advisory": "WSO2-2024-3566", "discovery": "EXTERNAL" }, "title": "Authenticated Arbitrary File Upload in Multiple WSO2 Products via SOAP Admin Service Leading to Remote Code Execution", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-7074", "datePublished": "2025-06-02T16:42:19.264Z", "dateReserved": "2024-07-24T12:15:52.796Z", "dateUpdated": "2025-06-02T17:05:49.920Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-2905 (GCVE-0-2025-2905)
Vulnerability from cvelistv5
Published
2025-05-05 09:02
Modified
2025-05-05 12:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference
Summary
An XML External Entity (XXE) vulnerability exists in the gateway component of WSO2 API Manager due to insufficient validation of XML input in crafted URL paths. User-supplied XML is parsed without appropriate restrictions, enabling external entity resolution.
This vulnerability can be exploited by an unauthenticated remote attacker to read files from the server’s filesystem or perform denial-of-service (DoS) attacks.
*
On systems running JDK 7 or early JDK 8, full file contents may be exposed.
*
On later versions of JDK 8 and newer, only the first line of a file may be read, due to improvements in XML parser behavior.
*
DoS attacks such as "Billion Laughs" payloads can cause service disruption.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WSO2 | WSO2 API Manager |
Version: 0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2905", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-05T12:44:33.257401Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-05T12:45:10.518Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThanOrEqual": "2.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "crnkovic" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eAn XML External Entity (XXE) vulnerability exists in the gateway component of WSO2 API Manager due to insufficient validation of XML input in crafted URL paths. User-supplied XML is parsed without appropriate restrictions, enabling external entity resolution.\u003c/p\u003e\n\u003cp\u003eThis vulnerability can be exploited by an unauthenticated remote attacker to read files from the server\u2019s filesystem or perform denial-of-service (DoS) attacks.\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003eOn systems running \u003cstrong\u003eJDK 7 or early JDK 8\u003c/strong\u003e, full file contents may be exposed.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eOn \u003cstrong\u003elater versions of JDK 8 and newer\u003c/strong\u003e, only the \u003cstrong\u003efirst line\u003c/strong\u003e of a file may be read, due to improvements in XML parser behavior.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDoS attacks such as \"Billion Laughs\" payloads can cause service disruption.\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e" } ], "value": "An XML External Entity (XXE) vulnerability exists in the gateway component of WSO2 API Manager due to insufficient validation of XML input in crafted URL paths. User-supplied XML is parsed without appropriate restrictions, enabling external entity resolution.\n\n\nThis vulnerability can be exploited by an unauthenticated remote attacker to read files from the server\u2019s filesystem or perform denial-of-service (DoS) attacks.\n\n\n\n * \nOn systems running JDK 7 or early JDK 8, full file contents may be exposed.\n\n\n\n\n * \nOn later versions of JDK 8 and newer, only the first line of a file may be read, due to improvements in XML parser behavior.\n\n\n\n\n * \nDoS attacks such as \"Billion Laughs\" payloads can cause service disruption." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-05T09:02:01.489Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3993/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Follow the instructions given on\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3993/#solution\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3...\u003c/a\u003e\u003cbr\u003e" } ], "value": "Follow the instructions given on\u00a0 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3993/#solution" } ], "source": { "advisory": "WSO2-2025-3993", "discovery": "EXTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "Unauthenticated XML External Entity (XXE) Vulnerability in WSO2 API Manager Gateway Component", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2025-2905", "datePublished": "2025-05-05T09:02:01.489Z", "dateReserved": "2025-03-28T08:46:09.062Z", "dateUpdated": "2025-05-05T12:45:10.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-2321 (GCVE-0-2024-2321)
Vulnerability from cvelistv5
Published
2025-02-27 04:08
Modified
2025-02-27 14:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
An incorrect authorization vulnerability exists in multiple WSO2 products, allowing protected APIs to be accessed directly using a refresh token instead of the expected access token. Due to improper authorization checks and token mapping, session cookies are not required for API access, potentially enabling unauthorized operations.
Exploitation requires an attacker to obtain a valid refresh token of an admin user. Since refresh tokens generally have a longer expiration time, this could lead to prolonged unauthorized access to API resources, impacting data confidentiality and integrity.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 4.0.0 < 4.0.0.275 Version: 4.1.0 < 4.1.0.153 Version: 4.2.0 < 4.2.0.83 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-2321", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-27T14:43:03.702935Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T14:43:16.368Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "3.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "4.0.0.275", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.153", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.83", "status": "affected", "version": "4.2.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "vendor": "WSO2", "versions": [ { "lessThan": "5.9.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.11.0.326", "status": "affected", "version": "5.11.0", "versionType": "custom" }, { "lessThan": "6.0.0.172", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.130", "status": "affected", "version": "6.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eAn incorrect authorization vulnerability exists in multiple WSO2 products, allowing protected APIs to be accessed directly using a refresh token instead of the expected access token. Due to improper authorization checks and token mapping, session cookies are not required for API access, potentially enabling unauthorized operations.\u003c/p\u003e\u003cp\u003eExploitation requires an attacker to obtain a valid refresh token of an admin user. Since refresh tokens generally have a longer expiration time, this could lead to prolonged unauthorized access to API resources, impacting data confidentiality and integrity.\u003c/p\u003e" } ], "value": "An incorrect authorization vulnerability exists in multiple WSO2 products, allowing protected APIs to be accessed directly using a refresh token instead of the expected access token. Due to improper authorization checks and token mapping, session cookies are not required for API access, potentially enabling unauthorized operations.\n\nExploitation requires an attacker to obtain a valid refresh token of an admin user. Since refresh tokens generally have a longer expiration time, this could lead to prolonged unauthorized access to API resources, impacting data confidentiality and integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-27T04:08:33.552Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3213/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3213/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3213/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3213/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3213/#solution" } ], "source": { "advisory": "WSO2-2024-3213", "discovery": "INTERNAL" }, "title": "Incorrect Authorization in Multiple WSO2 Products Allows API Access via Refresh Token", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-2321", "datePublished": "2025-02-27T04:08:33.552Z", "dateReserved": "2024-03-08T10:50:05.874Z", "dateUpdated": "2025-02-27T14:43:16.368Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4760 (GCVE-0-2025-4760)
Vulnerability from cvelistv5
Published
2025-09-23 14:55
Modified
2025-09-23 19:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
An authenticated stored cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to improper validation of user-supplied input during API document upload in the Publisher portal. A user with publisher privileges can upload a crafted API document containing malicious JavaScript, which is later rendered in the browser when accessed by other users.
A successful attack could result in redirection to malicious websites, unauthorized UI modifications, or exfiltration of browser-accessible data. However, session-related sensitive cookies are protected by the httpOnly flag, preventing session hijacking.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 3.2.0 < 3.2.0.428 Version: 3.2.1 < 3.2.1.48 Version: 4.1.0 < 4.1.0.209 Version: 4.2.0 < 4.2.0.145 Version: 4.3.0 < 4.3.0.60 Version: 4.4.0 < 4.4.0.23 Version: 4.5.0 < 4.5.0.7 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4760", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-23T19:58:20.115874Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-23T19:58:26.062Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "3.2.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.2.0.428", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.48", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.1.0.209", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.145", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.60", "status": "affected", "version": "4.3.0", "versionType": "custom" }, { "lessThan": "4.4.0.23", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.5.0.7", "status": "affected", "version": "4.5.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Control Plane", "vendor": "WSO2", "versions": [ { "lessThan": "4.5.0.8", "status": "affected", "version": "4.5.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Universal Gateway", "vendor": "WSO2", "versions": [ { "lessThan": "4.5.0.7", "status": "affected", "version": "4.5.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Traffic Manager", "vendor": "WSO2", "versions": [ { "lessThan": "4.5.0.7", "status": "affected", "version": "4.5.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "packageName": "org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.api", "product": "WSO2 Carbon API Management API", "vendor": "WSO2", "versions": [ { "lessThan": "6.7.206.559", "status": "affected", "version": "6.7.206", "versionType": "custom" }, { "lessThan": "6.7.210.48", "status": "affected", "version": "6.7.210", "versionType": "custom" }, { "lessThan": "9.20.74.365", "status": "affected", "version": "9.20.74", "versionType": "custom" }, { "lessThan": "9.28.116.321", "status": "affected", "version": "9.28.116", "versionType": "custom" }, { "lessThan": "9.29.120.163", "status": "affected", "version": "9.29.120", "versionType": "custom" }, { "lessThan": "9.30.67.80", "status": "affected", "version": "9.30.67", "versionType": "custom" }, { "lessThan": "9.31.86.30", "status": "affected", "version": "9.31.86", "versionType": "custom" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "9.31.117", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Ph\u1ea1m H\u1ed3 Anh D\u0169ng" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An authenticated stored cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to improper validation of user-supplied input during API document upload in the Publisher portal. A user with publisher privileges can upload a crafted API document containing malicious JavaScript, which is later rendered in the browser when accessed by other users.\u003cbr\u003e\u003cbr\u003eA successful attack could result in redirection to malicious websites, unauthorized UI modifications, or exfiltration of browser-accessible data. However, session-related sensitive cookies are protected by the httpOnly flag, preventing session hijacking.\u003cbr\u003e" } ], "value": "An authenticated stored cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to improper validation of user-supplied input during API document upload in the Publisher portal. A user with publisher privileges can upload a crafted API document containing malicious JavaScript, which is later rendered in the browser when accessed by other users.\n\nA successful attack could result in redirection to malicious websites, unauthorized UI modifications, or exfiltration of browser-accessible data. However, session-related sensitive cookies are protected by the httpOnly flag, preventing session hijacking." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-23T14:55:04.917Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4104/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4104/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4104/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4104/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4104/#solution" } ], "source": { "advisory": "WSO2-2025-4104", "discovery": "EXTERNAL" }, "title": "Authenticated Stored Cross-Site Scripting (XSS) in Multiple WSO2 Products via API Document Upload in Publisher", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2025-4760", "datePublished": "2025-09-23T14:55:04.917Z", "dateReserved": "2025-05-15T10:20:31.569Z", "dateUpdated": "2025-09-23T19:58:26.062Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-6835 (GCVE-0-2023-6835)
Vulnerability from cvelistv5
Published
2023-12-15 09:16
Modified
2024-08-02 08:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Multiple WSO2 products have been identified as vulnerable due to lack of server-side input validation in the Forum feature, API rating could be manipulated.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 2.2.0.0 < 2.2.0.16 Version: 2.5.0.0 < 2.5.0.17 Version: 2.6.0.0 < 2.6.0.24 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:07.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1357/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "repo": "https://github.com/wso2/product-apim", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.2.0.16", "status": "affected", "version": "2.2.0.0", "versionType": "custom" }, { "lessThan": "2.5.0.17", "status": "affected", "version": "2.5.0.0", "versionType": "custom" }, { "lessThan": "2.6.0.24", "status": "affected", "version": "2.6.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 IoT Server", "repo": "https://github.com/wso2/product-iots", "vendor": "WSO2", "versions": [ { "lessThan": "3.3.1.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.3.1.17", "status": "affected", "version": "3.3.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple WSO2 products have been identified as vulnerable d\u003cspan style=\"background-color: var(--wht);\"\u003eue to lack of server-side input validation in the \u003c/span\u003e\u003cstrong\u003eForum\u003c/strong\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;feature, API rating could be manipulated.\u003c/span\u003e" } ], "value": "Multiple WSO2 products have been identified as vulnerable due to lack of server-side input validation in the Forum\u00a0feature, API rating could be manipulated." } ], "impacts": [ { "capecId": "CAPEC-153", "descriptions": [ { "lang": "en", "value": "CAPEC-153 Input Data Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-15T09:16:27.473Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1357/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\u003cbr\u003e\u003cbr\u003eCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1357/\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1...\u003c/a\u003e\u003cbr\u003e" } ], "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u00a0 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1357/ \n" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2023-6835", "datePublished": "2023-12-15T09:16:27.473Z", "dateReserved": "2023-12-15T09:13:13.207Z", "dateUpdated": "2024-08-02T08:42:07.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-6429 (GCVE-0-2024-6429)
Vulnerability from cvelistv5
Published
2025-09-23 16:37
Modified
2025-09-23 16:37
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A content spoofing vulnerability exists in multiple WSO2 products due to improper error message handling. Under certain conditions, error messages are passed through URL parameters without validation, allowing malicious actors to inject arbitrary content into the UI.
By exploiting this vulnerability, attackers can manipulate browser-displayed error messages, enabling social engineering attacks through deceptive or misleading content.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 Identity Server as Key Manager |
Version: 5.10.0 < 5.10.0.338 |
|||||||||||
|
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 Identity Server as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0.338", "status": "affected", "version": "5.10.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "3.2.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.2.0.409", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.33", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.0.0.327", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.188", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.128", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.38", "status": "affected", "version": "4.3.0", "versionType": "custom" }, { "lessThan": "4.4.0.4", "status": "affected", "version": "4.4.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.10.0.314", "status": "affected", "version": "5.10.0", "versionType": "custom" }, { "lessThan": "5.11.0.359", "status": "affected", "version": "5.11.0", "versionType": "custom" }, { "lessThan": "6.0.0.203", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.176", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "7.0.0.48", "status": "affected", "version": "7.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A content spoofing vulnerability exists in multiple WSO2 products due to improper error message handling. Under certain conditions, error messages are passed through URL parameters without validation, allowing malicious actors to inject arbitrary content into the UI.\u003cbr\u003e\u003cbr\u003eBy exploiting this vulnerability, attackers can manipulate browser-displayed error messages, enabling social engineering attacks through deceptive or misleading content.\u003cbr\u003e" } ], "value": "A content spoofing vulnerability exists in multiple WSO2 products due to improper error message handling. Under certain conditions, error messages are passed through URL parameters without validation, allowing malicious actors to inject arbitrary content into the UI.\n\nBy exploiting this vulnerability, attackers can manipulate browser-displayed error messages, enabling social engineering attacks through deceptive or misleading content." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-23T16:37:58.340Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/#solution" } ], "source": { "advisory": "WSO2-2024-3490", "discovery": "INTERNAL" }, "title": "Content Spoofing in Multiple WSO2 Products via Error Message Injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-6429", "datePublished": "2025-09-23T16:37:58.340Z", "dateReserved": "2024-07-01T12:48:38.456Z", "dateUpdated": "2025-09-23T16:37:58.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-4598 (GCVE-0-2024-4598)
Vulnerability from cvelistv5
Published
2025-09-23 10:39
Modified
2025-09-23 19:35
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An information disclosure vulnerability exists in multiple WSO2 products due to improper implementation of the enrich mediator. Authenticated users may be able to view unintended business data from other mediation contexts because the internal state is not properly isolated or cleared between executions.
This vulnerability does not impact user credentials or access tokens but may lead to leakage of sensitive business information handled during message flows.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 3.2.0 < 3.2.0.422 Version: 3.2.1 < 3.2.1.42 Version: 4.1.0 < 4.1.0.152 Version: 4.3.0 < 4.3.0.55 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-4598", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-23T19:35:13.107728Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1259", "description": "CWE-1259 Improper Restriction of Security Token Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-23T19:35:33.987Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "3.2.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.2.0.422", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.42", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.1.0.152", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.3.0.55", "status": "affected", "version": "4.3.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Micro Integrator", "vendor": "WSO2", "versions": [ { "lessThan": "1.2.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.2.0.157", "status": "affected", "version": "1.2.0", "versionType": "custom" }, { "lessThan": "4.1.0.95", "status": "affected", "version": "4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An information disclosure vulnerability exists in multiple WSO2 products due to improper implementation of the enrich mediator. Authenticated users may be able to view unintended business data from other mediation contexts because the internal state is not properly isolated or cleared between executions.\u003cbr\u003e\u003cbr\u003eThis vulnerability does not impact user credentials or access tokens but may lead to leakage of sensitive business information handled during message flows." } ], "value": "An information disclosure vulnerability exists in multiple WSO2 products due to improper implementation of the enrich mediator. Authenticated users may be able to view unintended business data from other mediation contexts because the internal state is not properly isolated or cleared between executions.\n\nThis vulnerability does not impact user credentials or access tokens but may lead to leakage of sensitive business information handled during message flows." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-23T10:39:16.195Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3355/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3355/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3355/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3355/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3355/#solution" } ], "source": { "advisory": "WSO2-2024-3355", "discovery": "INTERNAL" }, "title": "Information Disclosure in Multiple WSO2 Products Due to Improper Handling in Enrich Mediator", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-4598", "datePublished": "2025-09-23T10:39:16.195Z", "dateReserved": "2024-05-07T06:40:12.013Z", "dateUpdated": "2025-09-23T19:35:33.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-5717 (GCVE-0-2025-5717)
Vulnerability from cvelistv5
Published
2025-09-23 16:05
Modified
2025-09-23 18:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Summary
An authenticated remote code execution (RCE) vulnerability exists in multiple WSO2 products due to improper input validation in the event processor admin service. A user with administrative access to the SOAP admin services can exploit this flaw by deploying a Siddhi execution plan containing malicious Java code, resulting in arbitrary code execution on the server.
Exploitation of this vulnerability requires a valid user account with administrative privileges, limiting the attack surface to authenticated but potentially malicious users.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 3.0.0 < 3.0.0.174 Version: 3.1.0 < 3.1.0.330 Version: 3.2.0 < 3.2.0.426 Version: 3.2.1 < 3.2.1.46 Version: 4.0.0 < 4.0.0.344 Version: 4.1.0 < 4.1.0.208 Version: 4.2.0 < 4.2.0.147 Version: 4.3.0 < 4.3.0.59 Version: 4.4.0 < 4.4.0.22 Version: 4.5.0 < 4.5.0.6 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-5717", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-23T18:31:28.992929Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-23T18:37:55.308Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "3.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.0.0.174", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThan": "3.1.0.330", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.2.0.426", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.46", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.0.0.344", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.208", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.147", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.59", "status": "affected", "version": "4.3.0", "versionType": "custom" }, { "lessThan": "4.4.0.22", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.5.0.6", "status": "affected", "version": "4.5.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking AM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.379", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Traffic Manager", "vendor": "WSO2", "versions": [ { "lessThan": "4.5.0.6", "status": "affected", "version": "4.5.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Control Plane", "vendor": "WSO2", "versions": [ { "lessThan": "4.5.0.6", "status": "affected", "version": "4.5.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "packageName": "org.wso2.siddhi:siddhi-extension-eval-scriptApache", "product": "Siddhi Extension Evaluate Scripts", "vendor": "WSO2", "versions": [ { "lessThan": "3.2.6.8", "status": "affected", "version": "3.2.6", "versionType": "custom" }, { "lessThan": "3.2.7.6", "status": "affected", "version": "3.2.7", "versionType": "custom" }, { "lessThan": "3.2.8.3", "status": "affected", "version": "3.2.8", "versionType": "custom" }, { "lessThan": "3.2.10.1", "status": "affected", "version": "3.2.10", "versionType": "custom" }, { "lessThan": "3.2.13.2", "status": "affected", "version": "3.2.13", "versionType": "custom" }, { "lessThan": "3.2.14.1", "status": "affected", "version": "3.2.14", "versionType": "custom" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "3.2.15", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "No\u00ebl MACCARY" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An authenticated remote code execution (RCE) vulnerability exists in multiple WSO2 products due to improper input validation in the event processor admin service. A user with administrative access to the SOAP admin services can exploit this flaw by deploying a Siddhi execution plan containing malicious Java code, resulting in arbitrary code execution on the server.\u003cbr\u003e\u003cbr\u003eExploitation of this vulnerability requires a valid user account with administrative privileges, limiting the attack surface to authenticated but potentially malicious users.\u003cbr\u003e" } ], "value": "An authenticated remote code execution (RCE) vulnerability exists in multiple WSO2 products due to improper input validation in the event processor admin service. A user with administrative access to the SOAP admin services can exploit this flaw by deploying a Siddhi execution plan containing malicious Java code, resulting in arbitrary code execution on the server.\n\nExploitation of this vulnerability requires a valid user account with administrative privileges, limiting the attack surface to authenticated but potentially malicious users." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-23T16:05:19.923Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4119/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4119/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4119/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4119/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4119/#solution" } ], "source": { "advisory": "WSO2-2025-4119", "discovery": "EXTERNAL" }, "title": "Authenticated Remote Code Execution in Multiple WSO2 Products via Event Processor Admin Service", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2025-5717", "datePublished": "2025-09-23T16:05:19.923Z", "dateReserved": "2025-06-05T06:06:53.039Z", "dateUpdated": "2025-09-23T18:37:55.308Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-6914 (GCVE-0-2024-6914)
Vulnerability from cvelistv5
Published
2025-05-22 18:26
Modified
2025-08-27 21:34
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
An incorrect authorization vulnerability exists in multiple WSO2 products due to a business logic flaw in the account recovery-related SOAP admin service. A malicious actor can exploit this vulnerability to reset the password of any user account, leading to a complete account takeover, including accounts with elevated privileges.
This vulnerability is exploitable only through the account recovery SOAP admin services exposed via the "/services" context path in affected products. The impact may be reduced if access to these endpoints has been restricted based on the "Security Guidelines for Production Deployment" by disabling exposure to untrusted networks.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 2.2.0 < 2.2.0.55 Version: 2.5.0 < 2.5.0.82 Version: 2.6.0 < 2.6.0.141 Version: 3.0.0 < 3.0.0.161 Version: 3.1.0 < 3.1.0.292 Version: 3.2.0 < 3.2.0.382 Version: 3.2.1 < 3.2.1.14 Version: 4.0.0 < 4.0.0.304 Version: 4.1.0 < 4.1.0.164 Version: 4.2.0 < 4.2.0.99 Version: 4.3.0 < 4.3.0.15 |
|||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-6914", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-22T18:37:41.259041Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-27T21:34:47.372Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.2.0.55", "status": "affected", "version": "2.2.0", "versionType": "custom" }, { "lessThan": "2.5.0.82", "status": "affected", "version": "2.5.0", "versionType": "custom" }, { "lessThan": "2.6.0.141", "status": "affected", "version": "2.6.0", "versionType": "custom" }, { "lessThan": "3.0.0.161", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThan": "3.1.0.292", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.2.0.382", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.14", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.0.0.304", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.164", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.99", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.15", "status": "affected", "version": "4.3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "WSO2 Governance Registry", "vendor": "WSO2", "versions": [ { "lessThan": "5.4.0.14", "status": "affected", "version": "5.4.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "vendor": "WSO2", "versions": [ { "lessThan": "5.3.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.3.0.31", "status": "affected", "version": "5.3.0", "versionType": "custom" }, { "lessThan": "5.4.0.30", "status": "affected", "version": "5.4.0", "versionType": "custom" }, { "lessThan": "5.4.1.35", "status": "affected", "version": "5.4.1", "versionType": "custom" }, { "lessThan": "5.5.0.48", "status": "affected", "version": "5.5.0", "versionType": "custom" }, { "lessThan": "5.6.0.56", "status": "affected", "version": "5.6.0", "versionType": "custom" }, { "lessThan": "5.7.0.122", "status": "affected", "version": "5.7.0", "versionType": "custom" }, { "lessThan": "5.8.0.104", "status": "affected", "version": "5.8.0", "versionType": "custom" }, { "lessThan": "5.9.0.155", "status": "affected", "version": "5.9.0", "versionType": "custom" }, { "lessThan": "5.10.0.317", "status": "affected", "version": "5.10.0", "versionType": "custom" }, { "lessThan": "5.11.0.363", "status": "affected", "version": "5.11.0", "versionType": "custom" }, { "lessThan": "6.0.0.207", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.184", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "7.0.0.56", "status": "affected", "version": "7.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.3.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.3.0.36", "status": "affected", "version": "5.3.0", "versionType": "custom" }, { "lessThan": "5.5.0.49", "status": "affected", "version": "5.5.0", "versionType": "custom" }, { "lessThan": "5.6.0.70", "status": "affected", "version": "5.6.0", "versionType": "custom" }, { "lessThan": "5.7.0.121", "status": "affected", "version": "5.7.0", "versionType": "custom" }, { "lessThan": "5.9.0.162", "status": "affected", "version": "5.9.0", "versionType": "custom" }, { "lessThan": "5.10.0.311", "status": "affected", "version": "5.10.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "WSO2 IoT", "vendor": "WSO2", "versions": [ { "lessThan": "3.3.0.59", "status": "affected", "version": "3.3.0", "versionType": "custom" }, { "lessThan": "3.3.1.61", "status": "affected", "version": "3.3.1", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking AM", "vendor": "WSO2", "versions": [ { "lessThan": "1.3.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.3.0.130", "status": "affected", "version": "1.3.0", "versionType": "custom" }, { "lessThan": "1.4.0.133", "status": "affected", "version": "1.4.0", "versionType": "custom" }, { "lessThan": "1.5.0.135", "status": "affected", "version": "1.5.0", "versionType": "custom" }, { "lessThan": "2.0.0.341", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open banking KM", "vendor": "WSO2", "versions": [ { "lessThan": "1.3.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.3.0.113", "status": "affected", "version": "1.3.0", "versionType": "custom" }, { "lessThan": "1.4.0.129", "status": "affected", "version": "1.4.0", "versionType": "custom" }, { "lessThan": "1.5.0.119", "status": "affected", "version": "1.5.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking IAM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0.362", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "packageName": "org.wso2.carbon.identity.framework:org.wso2.carbon.identity.mgt", "product": "WSO2 Carbon Identity Management", "vendor": "WSO2", "versions": [ { "lessThan": "5.7.5.9", "status": "affected", "version": "5.7.5", "versionType": "custom" }, { "lessThan": "5.10.86.4", "status": "affected", "version": "5.10.86", "versionType": "custom" }, { "lessThan": "5.10.112.14", "status": "affected", "version": "5.10.112", "versionType": "custom" }, { "lessThan": "5.11.148.13", "status": "affected", "version": "5.11.148", "versionType": "custom" }, { "lessThan": "5.11.256.15", "status": "affected", "version": "5.11.256", "versionType": "custom" }, { "lessThan": "5.12.153.58", "status": "affected", "version": "5.12.153", "versionType": "custom" }, { "lessThan": "5.12.387.41", "status": "affected", "version": "5.12.387", "versionType": "custom" }, { "lessThan": "5.14.97.75", "status": "affected", "version": "5.14.97", "versionType": "custom" }, { "lessThan": "5.17.5.282", "status": "affected", "version": "5.17.5", "versionType": "custom" }, { "lessThan": "5.17.118.4", "status": "affected", "version": "5.17.118", "versionType": "custom" }, { "lessThan": "5.18.187.265", "status": "affected", "version": "5.18.187", "versionType": "custom" }, { "lessThan": "5.18.248.14", "status": "affected", "version": "5.18.248", "versionType": "custom" }, { "lessThan": "5.23.8.184", "status": "affected", "version": "5.23.8", "versionType": "custom" }, { "lessThan": "5.24.8.6", "status": "affected", "version": "5.24.8", "versionType": "custom" }, { "lessThan": "5.25.92.92", "status": "affected", "version": "5.25.92", "versionType": "custom" }, { "lessThan": "5.25.705.6", "status": "affected", "version": "5.25.705", "versionType": "custom" }, { "lessThan": "7.0.78.32", "status": "affected", "version": "7.0.78", "versionType": "custom" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "7.3.44", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Anonymous working with Trend Micro Zero Day Initiative" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An incorrect authorization vulnerability exists in multiple WSO2 products due to a business logic flaw in the account recovery-related SOAP admin service. A malicious actor can exploit this vulnerability to reset the password of any user account, leading to a complete account takeover, including accounts with elevated privileges.\u003cbr\u003e\u003cbr\u003eThis vulnerability is exploitable only through the account recovery SOAP admin services exposed via the \"/services\" context path in affected products. The impact may be reduced if access to these endpoints has been restricted based on the \"\u003cb\u003eSecurity Guidelines for Production Deployment\u003c/b\u003e\" by disabling exposure to untrusted networks." } ], "value": "An incorrect authorization vulnerability exists in multiple WSO2 products due to a business logic flaw in the account recovery-related SOAP admin service. A malicious actor can exploit this vulnerability to reset the password of any user account, leading to a complete account takeover, including accounts with elevated privileges.\n\nThis vulnerability is exploitable only through the account recovery SOAP admin services exposed via the \"/services\" context path in affected products. The impact may be reduced if access to these endpoints has been restricted based on the \"Security Guidelines for Production Deployment\" by disabling exposure to untrusted networks." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "When \"Security Guidelines for Production Deployment\" are not followed and \"/services\" context is public exposed (Worst Case)" } ] }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "When \"Security Guidelines for Production Deployment\" are followed and \"/services\" context is only accessible by trusted networks" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-22T18:26:15.042Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3561/" }, { "tags": [ "related" ], "url": "https://security.docs.wso2.com/en/latest/security-guidelines/security-guidelines-for-production-deployment/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3561/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3561/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3561/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3561/#solution" } ], "source": { "advisory": "WSO2-2024-3561", "discovery": "EXTERNAL" }, "title": "Incorrect Authorization in Multiple WSO2 Products via Account Recovery SOAP Admin Service Leading to Account Takeover", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-6914", "datePublished": "2025-05-22T18:26:15.042Z", "dateReserved": "2024-07-19T10:14:31.390Z", "dateUpdated": "2025-08-27T21:34:47.372Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-5848 (GCVE-0-2024-5848)
Vulnerability from cvelistv5
Published
2025-02-27 07:08
Modified
2025-02-27 14:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to improper input validation. User-supplied data is directly included in server responses from vulnerable service endpoints without proper sanitization or encoding, allowing an attacker to inject malicious JavaScript.
Successful exploitation could lead to UI manipulation, redirection to malicious websites, or data exfiltration from the browser. While session-related sensitive cookies are protected with the httpOnly flag, mitigating session hijacking risks, the impact may vary depending on gateway-level service restrictions.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 3.1.0 < 3.1.0.285 Version: 3.2.0 < 3.2.0.375 Version: 3.2.1 < 3.2.1.10 Version: 4.0.0 < 4.0.0.300 Version: 4.1.0 < 4.1.0.160 Version: 4.2.0 < 4.2.0.92 Version: 4.3.0 < 4.3.0.10 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5848", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-27T14:40:09.476157Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T14:40:20.053Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "3.1.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.1.0.285", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.2.0.375", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.10", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.0.0.300", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.160", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.92", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.10", "status": "affected", "version": "4.3.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking AM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.349", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to improper input validation. User-supplied data is directly included in server responses from vulnerable service endpoints without proper sanitization or encoding, allowing an attacker to inject malicious JavaScript.\u003cbr\u003e\u003cbr\u003eSuccessful exploitation could lead to UI manipulation, redirection to malicious websites, or data exfiltration from the browser. While session-related sensitive cookies are protected with the httpOnly flag, mitigating session hijacking risks, the impact may vary depending on gateway-level service restrictions.\u003cbr\u003e\u003cbr\u003e" } ], "value": "A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to improper input validation. User-supplied data is directly included in server responses from vulnerable service endpoints without proper sanitization or encoding, allowing an attacker to inject malicious JavaScript.\n\nSuccessful exploitation could lead to UI manipulation, redirection to malicious websites, or data exfiltration from the browser. While session-related sensitive cookies are protected with the httpOnly flag, mitigating session hijacking risks, the impact may vary depending on gateway-level service restrictions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-27T07:08:07.346Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3450/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3450/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3450/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3450/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3450/#solution" } ], "source": { "advisory": "WSO2-2024-3450", "discovery": "INTERNAL" }, "title": "Reflected Cross-Site Scripting (XSS) in Multiple WSO2 Products Due to Improper Input Validation", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-5848", "datePublished": "2025-02-27T07:08:07.346Z", "dateReserved": "2024-06-11T07:22:24.988Z", "dateUpdated": "2025-02-27T14:40:20.053Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-3511 (GCVE-0-2024-3511)
Vulnerability from cvelistv5
Published
2025-06-23 08:47
Modified
2025-06-23 12:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
An incorrect authorization vulnerability exists in multiple WSO2 products that allows unauthorized access to versioned files stored in the registry. Due to flawed authorization logic, a malicious actor with access to the management console can exploit a specific bypass method to retrieve versioned files without proper authorization.
Successful exploitation of this vulnerability could lead to unauthorized disclosure of configuration or resource files that may be stored as registry versions, potentially aiding further attacks or system reconnaissance.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 Enterprise Integrator |
Version: 6.6.0 < 6.6.0.205 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3511", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-23T12:38:22.864048Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-23T12:43:45.452Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 Enterprise Integrator", "vendor": "WSO2", "versions": [ { "lessThan": "6.6.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "6.6.0.205", "status": "affected", "version": "6.6.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "3.1.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.1.0.273", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.2.0.361", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.13", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.0.0.306", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.163", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.98", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.17", "status": "affected", "version": "4.3.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.10.0.289", "status": "affected", "version": "5.10.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.10.0.292", "status": "affected", "version": "5.10.0", "versionType": "custom" }, { "lessThan": "5.11.0.333", "status": "affected", "version": "5.11.0", "versionType": "custom" }, { "lessThan": "6.0.0.180", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.141", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "7.0.0.8", "status": "affected", "version": "7.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking AM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.320", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking IAM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.341", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "packageName": "org.wso2.carbon:org.wso2.carbon.user.core", "product": "WSO2 Carbon User Manager Kernel", "vendor": "WSO2", "versions": [ { "lessThan": "4.5.0.5", "status": "affected", "version": "4.5.0", "versionType": "custom" }, { "lessThan": "4.5.3.35", "status": "affected", "version": "4.5.3", "versionType": "custom" }, { "lessThan": "4.6.0.140", "status": "affected", "version": "4.6.0", "versionType": "custom" }, { "lessThan": "4.6.1.107", "status": "affected", "version": "4.6.1", "versionType": "custom" }, { "lessThan": "4.6.2.323", "status": "affected", "version": "4.6.2", "versionType": "custom" }, { "lessThan": "4.6.3.18", "status": "affected", "version": "4.6.3", "versionType": "custom" }, { "lessThan": "4.6.4.3", "status": "affected", "version": "4.6.4", "versionType": "custom" }, { "lessThan": "4.7.1.47", "status": "affected", "version": "4.7.1", "versionType": "custom" }, { "lessThan": "4.8.1.19", "status": "affected", "version": "4.8.1", "versionType": "custom" }, { "lessThan": "4.9.0.52", "status": "affected", "version": "4.9.0", "versionType": "custom" }, { "lessThan": "4.9.26.10", "status": "affected", "version": "4.9.26", "versionType": "custom" }, { "lessThan": "4.10.9.8", "status": "affected", "version": "4.10.9", "versionType": "custom" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "4.10.13", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Viral Maniar - Security Researcher at Preemptive Cyber Security Pty Ltd" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An incorrect authorization vulnerability exists in multiple WSO2 products that allows unauthorized access to versioned files stored in the registry. Due to flawed authorization logic, a malicious actor with access to the management console can exploit a specific bypass method to retrieve versioned files without proper authorization.\u003cbr\u003e\u003cbr\u003eSuccessful exploitation of this vulnerability could lead to unauthorized disclosure of configuration or resource files that may be stored as registry versions, potentially aiding further attacks or system reconnaissance.\u003cbr\u003e" } ], "value": "An incorrect authorization vulnerability exists in multiple WSO2 products that allows unauthorized access to versioned files stored in the registry. Due to flawed authorization logic, a malicious actor with access to the management console can exploit a specific bypass method to retrieve versioned files without proper authorization.\n\nSuccessful exploitation of this vulnerability could lead to unauthorized disclosure of configuration or resource files that may be stored as registry versions, potentially aiding further attacks or system reconnaissance." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-23T08:47:55.266Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-2702/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-2702/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-2702/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-2702/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-2702/#solution" } ], "source": { "advisory": "WSO2-2024-2702", "discovery": "EXTERNAL" }, "title": "Incorrect Authorization in Multiple WSO2 Products Allows Unauthorized Access to Registry Versioned Files", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-3511", "datePublished": "2025-06-23T08:47:55.266Z", "dateReserved": "2024-04-09T12:08:02.707Z", "dateUpdated": "2025-06-23T12:43:45.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-7096 (GCVE-0-2024-7096)
Vulnerability from cvelistv5
Published
2025-05-30 14:54
Modified
2025-05-30 15:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
A privilege escalation vulnerability exists in multiple [Vendor Name] products due to a business logic flaw in SOAP admin services. A malicious actor can create a new user with elevated permissions only when all of the following conditions are met:
* SOAP admin services are accessible to the attacker.
* The deployment includes an internally used attribute that is not part of the default WSO2 product configuration.
* At least one custom role exists with non-default permissions.
* The attacker has knowledge of the custom role and the internal attribute used in the deployment.
Exploiting this vulnerability allows malicious actors to assign higher privileges to self-registered users, bypassing intended access control mechanisms.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 Open Banking IAM |
Version: 2.0.0 < 2.0.0.364 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-7096", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-30T15:01:23.580052Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-30T15:01:40.977Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 Open Banking IAM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.364", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking AM", "vendor": "WSO2", "versions": [ { "lessThan": "1.3.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.3.0.131", "status": "affected", "version": "1.3.0", "versionType": "custom" }, { "lessThan": "1.4.0.134", "status": "affected", "version": "1.4.0", "versionType": "custom" }, { "lessThan": "1.5.0.136", "status": "affected", "version": "1.5.0", "versionType": "custom" }, { "lessThan": "2.0.0.343", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.29", "status": "affected", "version": "2.0.0", "versionType": "custom" }, { "lessThan": "2.1.0.39", "status": "affected", "version": "2.1.0", "versionType": "custom" }, { "lessThan": "2.2.0.56", "status": "affected", "version": "2.2.0", "versionType": "custom" }, { "lessThan": "2.5.0.83", "status": "affected", "version": "2.5.0", "versionType": "custom" }, { "lessThan": "2.6.0.142", "status": "affected", "version": "2.6.0", "versionType": "custom" }, { "lessThan": "3.0.0.162", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThan": "3.1.0.294", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.2.0.384", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.16", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.0.0.305", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.166", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.101", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.16", "status": "affected", "version": "4.3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "WSO2 Enterprise Mobility Manager", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.26", "status": "affected", "version": "2.2.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "vendor": "WSO2", "versions": [ { "lessThan": "5.2.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.2.0.32", "status": "affected", "version": "5.2.0", "versionType": "custom" }, { "lessThan": "5.3.0.33", "status": "affected", "version": "5.3.0", "versionType": "custom" }, { "lessThan": "5.4.1.36", "status": "affected", "version": "5.4.1", "versionType": "custom" }, { "lessThan": "5.5.0.50", "status": "affected", "version": "5.5.0", "versionType": "custom" }, { "lessThan": "5.6.0.58", "status": "affected", "version": "5.6.0", "versionType": "custom" }, { "lessThan": "5.7.0.123", "status": "affected", "version": "5.7.0", "versionType": "custom" }, { "lessThan": "5.8.0.106", "status": "affected", "version": "5.8.0", "versionType": "custom" }, { "lessThan": "5.9.0.157", "status": "affected", "version": "5.9.0", "versionType": "custom" }, { "lessThan": "5.10.0.318", "status": "affected", "version": "5.10.0", "versionType": "custom" }, { "lessThan": "5.11.0.365", "status": "affected", "version": "5.11.0", "versionType": "custom" }, { "lessThan": "6.0.0.209", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.188", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "7.0.0.60", "status": "affected", "version": "7.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.3.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.3.0.38", "status": "affected", "version": "5.3.0", "versionType": "custom" }, { "lessThan": "5.5.0.51", "status": "affected", "version": "5.5.0", "versionType": "custom" }, { "lessThan": "5.6.0.72", "status": "affected", "version": "5.6.0", "versionType": "custom" }, { "lessThan": "5.7.0.122", "status": "affected", "version": "5.7.0", "versionType": "custom" }, { "lessThan": "5.9.0.165", "status": "affected", "version": "5.9.0", "versionType": "custom" }, { "lessThan": "5.10.0.312", "status": "affected", "version": "5.10.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking KM", "vendor": "WSO2", "versions": [ { "lessThan": "1.3.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.3.0.114", "status": "affected", "version": "1.3.0", "versionType": "custom" }, { "lessThan": "1.4.0.130", "status": "affected", "version": "1.4.0", "versionType": "custom" }, { "lessThan": "1.5.0.120", "status": "affected", "version": "1.5.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A privilege escalation vulnerability exists in multiple [Vendor Name] products due to a business logic flaw in SOAP admin services. A malicious actor can create a new user with elevated permissions \u003cb\u003eonly when all of the following conditions are met\u003c/b\u003e:\u003cbr\u003e\u003cul\u003e\u003cli\u003eSOAP admin services are accessible to the attacker.\u003c/li\u003e\u003cli\u003eThe deployment includes an internally used attribute that is not part of the default WSO2 product configuration.\u003c/li\u003e\u003cli\u003eAt least one custom role exists with non-default permissions.\u003c/li\u003e\u003cli\u003eThe attacker has knowledge of the custom role and the internal attribute used in the deployment.\u003c/li\u003e\u003c/ul\u003eExploiting this vulnerability allows malicious actors to assign higher privileges to self-registered users, bypassing intended access control mechanisms.\u003cbr\u003e" } ], "value": "A privilege escalation vulnerability exists in multiple [Vendor Name] products due to a business logic flaw in SOAP admin services. A malicious actor can create a new user with elevated permissions only when all of the following conditions are met:\n * SOAP admin services are accessible to the attacker.\n * The deployment includes an internally used attribute that is not part of the default WSO2 product configuration.\n * At least one custom role exists with non-default permissions.\n * The attacker has knowledge of the custom role and the internal attribute used in the deployment.\n\n\nExploiting this vulnerability allows malicious actors to assign higher privileges to self-registered users, bypassing intended access control mechanisms." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-30T15:00:56.617Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3573/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Follow the instructions given on \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3573/#solution\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3...\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3573/#solution" } ], "source": { "advisory": "WSO2-2024-3573", "discovery": "INTERNAL" }, "title": "Privilege Escalation in Multiple WSO2 Products via SOAP Admin Service Due to Business Logic Flaw", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-7096", "datePublished": "2025-05-30T14:54:32.417Z", "dateReserved": "2024-07-25T06:35:14.323Z", "dateUpdated": "2025-05-30T15:01:40.977Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-6837 (GCVE-0-2023-6837)
Vulnerability from cvelistv5
Published
2023-12-15 09:41
Modified
2025-06-05 08:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
Multiple WSO2 products have been identified as vulnerable to perform user impersonatoin using JIT provisioning. In order for this vulnerability to have any impact on your deployment, following conditions must be met:
* An IDP configured for federated authentication and JIT provisioning enabled with the "Prompt for username, password and consent" option.
* A service provider that uses the above IDP for federated authentication and has the "Assert identity using mapped local subject identifier" flag enabled.
Attacker should have:
* A fresh valid user account in the federated IDP that has not been used earlier.
* Knowledge of the username of a valid user in the local IDP.
When all preconditions are met, a malicious actor could use JIT provisioning flow to perform user impersonation.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 2.5.0 < 2.5.0.32 Version: 2.6.0 < 2.6.0.52 Version: 3.0.0 < 3.0.0.50 Version: 3.1.0 < 3.1.0.72 Version: 3.2.0 < 3.2.0.86 Version: 4.0.0 < 4.0.0.35 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:07.403Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1573/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "2.5.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.5.0.32", "status": "affected", "version": "2.5.0", "versionType": "custom" }, { "lessThan": "2.6.0.52", "status": "affected", "version": "2.6.0", "versionType": "custom" }, { "lessThan": "3.0.0.50", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThan": "3.1.0.72", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.2.0.86", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "4.0.0.35", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "vendor": "WSO2", "versions": [ { "lessThan": "5.6.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.6.0.16", "status": "affected", "version": "5.6.0", "versionType": "custom" }, { "lessThan": "5.7.0.35", "status": "affected", "version": "5.7.0", "versionType": "custom" }, { "lessThan": "5.8.0.26", "status": "affected", "version": "5.8.0", "versionType": "custom" }, { "lessThan": "5.9.0.38", "status": "affected", "version": "5.9.0", "versionType": "custom" }, { "lessThan": "5.10.0.78", "status": "affected", "version": "5.10.0", "versionType": "custom" }, { "lessThan": "5.11.0.69", "status": "affected", "version": "5.11.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.6.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.6.0.17", "status": "affected", "version": "5.6.0", "versionType": "custom" }, { "lessThan": "5.7.0.39", "status": "affected", "version": "5.7.0", "versionType": "custom" }, { "lessThan": "5.9.0.45", "status": "affected", "version": "5.9.0", "versionType": "custom" }, { "lessThan": "5.10.0.80", "status": "affected", "version": "5.10.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "packageName": "org.wso2.carbon.identity.framework:org.wso2.carbon.identity.application.authentication.framework", "product": "WSO2 Carbon Identity Application Authentication Framework", "vendor": "WSO2", "versions": [ { "lessThan": "5.11.256.3", "status": "affected", "version": "5.11.256", "versionType": "custom" }, { "lessThan": "5.12.153.21", "status": "affected", "version": "5.12.153", "versionType": "custom" }, { "lessThan": "5.12.387.7", "status": "affected", "version": "5.12.387", "versionType": "custom" }, { "lessThan": "5.14.97.22", "status": "affected", "version": "5.14.97", "versionType": "custom" }, { "lessThan": "5.17.5.106", "status": "affected", "version": "5.17.5", "versionType": "custom" }, { "lessThan": "5.18.187.76", "status": "affected", "version": "5.18.187", "versionType": "custom" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "5.20.254", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Ngh\u0129a V\u0169 Trung" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple WSO2 products have been identified as vulnerable to perform user impersonatoin using JIT provisioning. \u003cp\u003eIn order for this vulnerability to have any impact on your deployment, following conditions must be met:\u003c/p\u003e\u003cul\u003e\u003cli\u003eAn IDP configured for federated authentication and JIT provisioning enabled with the \"Prompt for username, password and consent\" option.\u003c/li\u003e\u003cli\u003eA service provider that uses the above IDP for federated authentication and has the \"Assert identity using mapped local subject identifier\" flag enabled.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eAttacker should have:\u003c/p\u003e\u003cul\u003e\u003cli\u003eA fresh valid user account in the federated IDP that has not been used earlier.\u003c/li\u003e\u003cli\u003eKnowledge of the username of a valid user in the local IDP.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eWhen all preconditions are met, a malicious actor could use JIT provisioning flow to perform user impersonation.\u003c/p\u003e" } ], "value": "Multiple WSO2 products have been identified as vulnerable to perform user impersonatoin using JIT provisioning. In order for this vulnerability to have any impact on your deployment, following conditions must be met:\n\n * An IDP configured for federated authentication and JIT provisioning enabled with the \"Prompt for username, password and consent\" option.\n * A service provider that uses the above IDP for federated authentication and has the \"Assert identity using mapped local subject identifier\" flag enabled.\n\n\nAttacker should have:\n\n * A fresh valid user account in the federated IDP that has not been used earlier.\n * Knowledge of the username of a valid user in the local IDP.\n\n\nWhen all preconditions are met, a malicious actor could use JIT provisioning flow to perform user impersonation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-05T08:42:04.098Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1573/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1573/#solution\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1...\u003c/a\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "Follow the instructions given on\u00a0 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1573/#solution" } ], "source": { "advisory": "WSO2-2021-1573", "discovery": "EXTERNAL" }, "title": "Incorrect Authorization in Multiple [Vendor Name] Products via Federated Authentication with JIT Provisioning Leading to User Impersonation", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2023-6837", "datePublished": "2023-12-15T09:41:22.719Z", "dateReserved": "2023-12-15T09:40:50.666Z", "dateUpdated": "2025-06-05T08:42:04.098Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-8008 (GCVE-0-2024-8008)
Vulnerability from cvelistv5
Published
2025-06-02 16:48
Modified
2025-06-06 14:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to insufficient output encoding in error messages generated by the JDBC user store connection validation request. A malicious actor can inject a specially crafted payload into the request, causing the browser to execute arbitrary JavaScript in the context of the vulnerable page.
This vulnerability may allow UI manipulation, redirection to malicious websites, or data exfiltration from the browser. However, since all session-related sensitive cookies are protected with the httpOnly flag, session hijacking is not possible.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 Enterprise Integrator |
Version: 6.6.0 < 6.6.0.211 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8008", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-02T17:05:11.526830Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-02T17:05:24.975Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 Enterprise Integrator", "vendor": "WSO2", "versions": [ { "lessThan": "6.6.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "6.6.0.211", "status": "affected", "version": "6.6.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "3.1.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.1.0.305", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.2.0.396", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.28", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.0.0.313", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.182", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.121", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.32", "status": "affected", "version": "4.3.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.10.0.321", "status": "affected", "version": "5.10.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.10.0.328", "status": "affected", "version": "5.10.0", "versionType": "custom" }, { "lessThan": "5.11.0.374", "status": "affected", "version": "5.11.0", "versionType": "custom" }, { "lessThan": "6.0.0.216", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.201", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "7.0.0.69", "status": "affected", "version": "7.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking IAM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.374", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking AM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.354", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "packageName": "org.wso2.carbon.identity.framework:org.wso2.carbon.identity.user.store.configuration.ui", "product": "WSO2 Carbon Identity User Store Configuration UI", "vendor": "WSO2", "versions": [ { "lessThan": "5.14.127.9", "status": "affected", "version": "5.14.127", "versionType": "custom" }, { "lessThan": "5.17.5.289", "status": "affected", "version": "5.17.5", "versionType": "custom" }, { "lessThan": "5.17.118.10", "status": "affected", "version": "5.17.118", "versionType": "custom" }, { "lessThan": "5.18.187.276", "status": "affected", "version": "5.18.187", "versionType": "custom" }, { "lessThan": "5.18.248.22", "status": "affected", "version": "5.18.248", "versionType": "custom" }, { "lessThan": "5.23.8.193", "status": "affected", "version": "5.23.8", "versionType": "custom" }, { "lessThan": "5.24.8.11", "status": "affected", "version": "5.24.8", "versionType": "custom" }, { "lessThan": "5.25.92.104", "status": "affected", "version": "5.25.92", "versionType": "custom" }, { "lessThan": "5.25.705.10", "status": "affected", "version": "5.25.705", "versionType": "custom" }, { "lessThan": "7.0.78.46", "status": "affected", "version": "7.0.78", "versionType": "custom" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "7.5.12", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to insufficient output encoding in error messages generated by the JDBC user store connection validation request. A malicious actor can inject a specially crafted payload into the request, causing the browser to execute arbitrary JavaScript in the context of the vulnerable page.\u003cbr\u003e\u003cbr\u003eThis vulnerability may allow UI manipulation, redirection to malicious websites, or data exfiltration from the browser. However, since all session-related sensitive cookies are protected with the httpOnly flag, session hijacking is not possible." } ], "value": "A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to insufficient output encoding in error messages generated by the JDBC user store connection validation request. A malicious actor can inject a specially crafted payload into the request, causing the browser to execute arbitrary JavaScript in the context of the vulnerable page.\n\nThis vulnerability may allow UI manipulation, redirection to malicious websites, or data exfiltration from the browser. However, since all session-related sensitive cookies are protected with the httpOnly flag, session hijacking is not possible." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-06T14:46:12.753Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3178/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3178/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3178/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3178/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3178/#solution" } ], "source": { "advisory": "WSO2-2024-3178", "discovery": "INTERNAL" }, "title": "Reflected Cross-Site Scripting (XSS) in Multiple WSO2 Products via JDBC User Store Connection Validation", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-8008", "datePublished": "2025-06-02T16:48:12.479Z", "dateReserved": "2024-08-20T11:32:44.245Z", "dateUpdated": "2025-06-06T14:46:12.753Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-5962 (GCVE-0-2024-5962)
Vulnerability from cvelistv5
Published
2025-05-22 19:34
Modified
2025-05-22 19:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
A reflected cross-site scripting (XSS) vulnerability exists in the authentication endpoint of multiple WSO2 products due to missing output encoding of user-supplied input. A malicious actor can exploit this vulnerability to inject arbitrary JavaScript into the authentication flow, potentially leading to UI modifications, redirections to malicious websites, or data exfiltration from the browser.
While this issue could allow an attacker to manipulate the user’s browser, session-related sensitive cookies remain protected with the httpOnly flag, preventing session hijacking.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 4.2.0 < 4.2.0.94 Version: 4.3.0 < 4.3.0.9 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5962", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-22T19:43:36.935325Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-22T19:43:48.259Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "4.2.0.94", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.9", "status": "affected", "version": "4.3.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "vendor": "WSO2", "versions": [ { "lessThan": "6.0.0.199", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.172", "status": "affected", "version": "6.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A reflected cross-site scripting (XSS) vulnerability exists in the authentication endpoint of multiple WSO2 products due to missing output encoding of user-supplied input. A malicious actor can exploit this vulnerability to inject arbitrary JavaScript into the authentication flow, potentially leading to UI modifications, redirections to malicious websites, or data exfiltration from the browser.\u003cbr\u003e\u003cbr\u003eWhile this issue could allow an attacker to manipulate the user\u2019s browser, session-related sensitive cookies remain protected with the httpOnly flag, preventing session hijacking." } ], "value": "A reflected cross-site scripting (XSS) vulnerability exists in the authentication endpoint of multiple WSO2 products due to missing output encoding of user-supplied input. A malicious actor can exploit this vulnerability to inject arbitrary JavaScript into the authentication flow, potentially leading to UI modifications, redirections to malicious websites, or data exfiltration from the browser.\n\nWhile this issue could allow an attacker to manipulate the user\u2019s browser, session-related sensitive cookies remain protected with the httpOnly flag, preventing session hijacking." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-22T19:34:05.818Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3443/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Follow the instructions given on \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3443/#solution\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3...\u003c/a\u003e \u003cbr\u003e\u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3443/#solution" } ], "source": { "advisory": "WSO2-2024-3443", "discovery": "INTERNAL" }, "title": "Reflected Cross-Site Scripting (XSS) in Authentication Endpoint of Multiple WSO2 Products Due to Missing Output Encoding", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-5962", "datePublished": "2025-05-22T19:34:05.818Z", "dateReserved": "2024-06-13T10:29:15.332Z", "dateUpdated": "2025-05-22T19:43:48.259Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-3509 (GCVE-0-2024-3509)
Vulnerability from cvelistv5
Published
2025-06-02 16:44
Modified
2025-06-02 17:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
A stored cross-site scripting (XSS) vulnerability exists in the Management Console of multiple WSO2 products due to insufficient input validation in the Rich Text Editor within the registry section.
To exploit this vulnerability, a malicious actor must have a valid user account with administrative access to the Management Console. If successful, the actor could inject persistent JavaScript payloads, enabling the theft of user data or execution of unauthorized actions on behalf of other users.
While this issue enables persistent client-side script execution, session-related cookies remain protected with the httpOnly flag, preventing session hijacking.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 Enterprise Integrator |
Version: 6.6.0 < 6.6.0.202 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3509", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-02T17:04:57.624046Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-02T17:05:38.912Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 Enterprise Integrator", "vendor": "WSO2", "versions": [ { "lessThan": "6.6.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "6.6.0.202", "status": "affected", "version": "6.6.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "3.1.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.1.0.275", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.2.0.392", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.19", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.0.0.308", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.171", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.107", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.21", "status": "affected", "version": "4.3.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking AM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.325", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking IAM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.345", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.10.0.292", "status": "affected", "version": "5.10.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.10.0.296", "status": "affected", "version": "5.10.0", "versionType": "custom" }, { "lessThan": "5.11.0.333", "status": "affected", "version": "5.11.0", "versionType": "custom" }, { "lessThan": "6.0.0.181", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.142", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "7.0.0.9", "status": "affected", "version": "7.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "packageName": "org.wso2.carbon.registry:org.wso2.carbon.registry.resource.ui", "product": "WSO2 Carbon Registry Resources UI", "vendor": "WSO2", "versions": [ { "lessThan": "4.7.24.6", "status": "affected", "version": "4.7.24", "versionType": "custom" }, { "lessThan": "4.7.32.10", "status": "affected", "version": "4.7.32", "versionType": "custom" }, { "lessThan": "4.7.33.8", "status": "affected", "version": "4.7.33", "versionType": "custom" }, { "lessThan": "4.7.35.8", "status": "affected", "version": "4.7.35", "versionType": "custom" }, { "lessThan": "4.7.39.6", "status": "affected", "version": "4.7.39", "versionType": "custom" }, { "lessThan": "4.7.51.2", "status": "affected", "version": "4.7.51", "versionType": "custom" }, { "lessThan": "4.8.3.7", "status": "affected", "version": "4.8.3", "versionType": "custom" }, { "lessThan": "4.8.9.3", "status": "affected", "version": "4.8.9", "versionType": "custom" }, { "lessThan": "4.8.12.2", "status": "affected", "version": "4.8.12", "versionType": "custom" }, { "lessThan": "4.8.13.4", "status": "affected", "version": "4.8.13", "versionType": "custom" }, { "lessThan": "4.8.24.1", "status": "affected", "version": "4.8.24", "versionType": "custom" }, { "lessThan": "4.8.32.2", "status": "affected", "version": "4.8.32", "versionType": "custom" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "4.8.35", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A stored cross-site scripting (XSS) vulnerability exists in the Management Console of multiple WSO2 products due to insufficient input validation in the Rich Text Editor within the registry section.\u003cbr\u003eTo exploit this vulnerability, a malicious actor must have a valid user account with administrative access to the Management Console. If successful, the actor could inject persistent JavaScript payloads, enabling the theft of user data or execution of unauthorized actions on behalf of other users.\u003cbr\u003e\u003cbr\u003eWhile this issue enables persistent client-side script execution, session-related cookies remain protected with the httpOnly flag, preventing session hijacking." } ], "value": "A stored cross-site scripting (XSS) vulnerability exists in the Management Console of multiple WSO2 products due to insufficient input validation in the Rich Text Editor within the registry section.\nTo exploit this vulnerability, a malicious actor must have a valid user account with administrative access to the Management Console. If successful, the actor could inject persistent JavaScript payloads, enabling the theft of user data or execution of unauthorized actions on behalf of other users.\n\nWhile this issue enables persistent client-side script execution, session-related cookies remain protected with the httpOnly flag, preventing session hijacking." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-02T16:44:28.668Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-2701" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Follow the instructions given on \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-2701/#solution\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-2...\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-2... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-2701/#solution" } ], "source": { "advisory": "WSO2-2024-2701", "discovery": "INTERNAL" }, "title": "Stored Cross-Site Scripting (XSS) in Management Console of Multiple WSO2 Products via Rich Text Editor", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-3509", "datePublished": "2025-06-02T16:44:28.668Z", "dateReserved": "2024-04-09T12:00:11.641Z", "dateUpdated": "2025-06-02T17:05:38.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-6911 (GCVE-0-2023-6911)
Vulnerability from cvelistv5
Published
2023-12-18 08:32
Modified
2024-08-02 08:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Multiple WSO2 products have been identified as vulnerable due to improper output encoding, a Stored Cross Site Scripting (XSS) attack can be carried out by an attacker injecting a malicious payload into the Registry feature of the Management Console.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 2.2.0.0 < 2.2.0.1 Version: 2.5.0.0 < 2.5.0.1 Version: 2.6.0.0 < 2.6.0.1 Version: 3.0.0.0 < 3.0.0.1 Version: 3.1.0.0 < 3.1.0.1 Version: 3.2.0.0 < 3.2.0.1 |
|||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:08.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "repo": "https://github.com/wso2/product-apim", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.2.0.1", "status": "affected", "version": "2.2.0.0", "versionType": "custom" }, { "lessThan": "2.5.0.1", "status": "affected", "version": "2.5.0.0", "versionType": "custom" }, { "lessThan": "2.6.0.1", "status": "affected", "version": "2.6.0.0", "versionType": "custom" }, { "lessThan": "3.0.0.1", "status": "affected", "version": "3.0.0.0", "versionType": "custom" }, { "lessThan": "3.1.0.1", "status": "affected", "version": "3.1.0.0", "versionType": "custom" }, { "lessThan": "3.2.0.1", "status": "affected", "version": "3.2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Manager Analytics", "repo": "https://github.com/wso2/analytics-apim", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.2.0.1", "status": "affected", "version": "2.2.0.0", "versionType": "custom" }, { "lessThan": "2.5.0.1", "status": "affected", "version": "2.5.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Microgateway", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.2.0.1", "status": "affected", "version": "2.2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Data Analytics Server", "vendor": "WSO2", "versions": [ { "lessThan": "3.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.2.0.1", "status": "affected", "version": "3.2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Enterprise Integrator", "repo": "https://github.com/wso2/product-ei", "vendor": "WSO2", "versions": [ { "lessThan": "6.1.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "6.1.0.9", "status": "affected", "version": "6.1.0.0", "versionType": "custom" }, { "lessThan": "6.1.1.9", "status": "affected", "version": "6.1.1.0", "versionType": "custom" }, { "lessThan": "6.2.0.7", "status": "affected", "version": "6.2.0.0", "versionType": "custom" }, { "lessThan": "6.3.0.1", "status": "affected", "version": "6.3.0.0", "versionType": "custom" }, { "lessThan": "6.4.0.1", "status": "affected", "version": "6.4.0.0", "versionType": "custom" }, { "lessThan": "6.5.0.6", "status": "affected", "version": "6.5.0.0", "versionType": "custom" }, { "lessThan": "6.6.0.11", "status": "affected", "version": "6.6.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 IS as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.5.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.5.0.1", "status": "affected", "version": "5.5.0.0", "versionType": "custom" }, { "lessThan": "5.6.0.1", "status": "affected", "version": "5.6.0.0", "versionType": "custom" }, { "lessThan": "5.7.0.1", "status": "affected", "version": "5.7.0.0", "versionType": "custom" }, { "lessThan": "5.9.0.1", "status": "affected", "version": "5.9.0.0", "versionType": "custom" }, { "lessThan": "5.10.0.1", "status": "affected", "version": "5.10.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "repo": "https://github.com/wso2/product-is", "vendor": "WSO2", "versions": [ { "lessThan": "5.4.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.4.0.4", "status": "affected", "version": "5.4.0.0", "versionType": "custom" }, { "lessThan": "5.4.1.3", "status": "affected", "version": "5.4.1.0", "versionType": "custom" }, { "lessThan": "5.5.0.1", "status": "affected", "version": "5.5.0.0", "versionType": "custom" }, { "lessThan": "5.6.0.1", "status": "affected", "version": "5.6.0.0", "versionType": "custom" }, { "lessThan": "5.7.0.1", "status": "affected", "version": "5.7.0.0", "versionType": "custom" }, { "lessThan": "5.8.0.5", "status": "affected", "version": "5.8.0.0", "versionType": "custom" }, { "lessThan": "5.9.0.1", "status": "affected", "version": "5.9.0.0", "versionType": "custom" }, { "lessThan": "5.10.0.1", "status": "affected", "version": "5.10.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server Analytics", "repo": "https://github.com/wso2/analytics-is", "vendor": "WSO2", "versions": [ { "lessThan": "5.4.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.4.0.2", "status": "affected", "version": "5.4.0.0", "versionType": "custom" }, { "lessThan": "5.4.1.2", "status": "affected", "version": "5.4.1.0", "versionType": "custom" }, { "lessThan": "5.5.0.1", "status": "affected", "version": "5.5.0.0", "versionType": "custom" }, { "lessThan": "5.6.0.1", "status": "affected", "version": "5.6.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Message Broker", "vendor": "WSO2", "versions": [ { "lessThan": "3.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.2.0.3", "status": "affected", "version": "3.2.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple WSO2 products have been identified as vulnerable due to improper output encoding, a Stored Cross Site Scripting (XSS) attack can be carried out by an attacker injecting a malicious payload into the Registry feature of the Management Console.\u003cbr\u003e" } ], "value": "Multiple WSO2 products have been identified as vulnerable due to improper output encoding, a Stored Cross Site Scripting (XSS) attack can be carried out by an attacker injecting a malicious payload into the Registry feature of the Management Console.\n" } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-18T08:32:58.961Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\u003cbr\u003e\u003cbr\u003eCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1...\u003c/a\u003e\u003cbr\u003e" } ], "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u00a0 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/ \n" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2023-6911", "datePublished": "2023-12-18T08:32:58.961Z", "dateReserved": "2023-12-18T08:23:45.214Z", "dateUpdated": "2024-08-02T08:42:08.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-6836 (GCVE-0-2023-6836)
Vulnerability from cvelistv5
Published
2023-12-15 09:26
Modified
2024-08-02 08:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference
Summary
Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 3.0.0.0 < 3.0.0.1 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:08.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager ", "repo": "https://github.com/wso2/product-apim", "vendor": "WSO2", "versions": [ { "lessThan": "3.0.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.0.0.1", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Manager Analytics", "repo": "https://github.com/wso2/analytics-apim", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.2.0.1", "status": "affected", "version": "2.2.0.0", "versionType": "custom" }, { "lessThan": "2.5.0.1", "status": "affected", "version": "2.5.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Microgateway", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.2.0.1", "status": "affected", "version": "2.2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Enterprise Integrator", "repo": "https://github.com/wso2/product-ei", "vendor": "WSO2", "versions": [ { "lessThan": "6.0.0.2", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "6.0.0.3", "status": "affected", "version": "6.0.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.5", "status": "affected", "version": "6.1.0.0", "versionType": "custom" }, { "lessThan": "6.1.1.5", "status": "affected", "version": "6.1.1.0", "versionType": "custom" }, { "lessThan": "6.6.0.1", "status": "affected", "version": "6.6.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 IS as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.5.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.5.0.1", "status": "affected", "version": "5.5.0.0", "versionType": "custom" }, { "lessThan": "5.6.0.1", "status": "affected", "version": "5.6.0.0", "versionType": "custom" }, { "lessThan": "5.7.0.1", "status": "affected", "version": "5.7.0.0", "versionType": "custom" }, { "lessThan": "5.9.0.1", "status": "affected", "version": "5.9.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "repo": "https://github.com/wso2/product-is", "vendor": "WSO2", "versions": [ { "lessThan": "5.4.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.4.0.1", "status": "affected", "version": "5.4.0.0", "versionType": "custom" }, { "lessThan": "5.4.1.1", "status": "affected", "version": "5.4.1.0", "versionType": "custom" }, { "lessThan": "5.5.0.1", "status": "affected", "version": "5.5.0.0", "versionType": "custom" }, { "lessThan": "5.6.0.1", "status": "affected", "version": "5.6.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Micro Integrator", "vendor": "WSO2", "versions": [ { "lessThan": "1.0.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.0.0.1", "status": "affected", "version": "1.0.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information." } ], "value": "Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information." } ], "impacts": [ { "capecId": "CAPEC-250", "descriptions": [ { "lang": "en", "value": "CAPEC-250 XML Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-09T05:03:32.570Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\u003cbr\u003e\u003cbr\u003eCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/\u003c/a\u003e\u003cbr\u003e" } ], "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/ https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/ \n" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2023-6836", "datePublished": "2023-12-15T09:26:01.323Z", "dateReserved": "2023-12-15T09:25:13.205Z", "dateUpdated": "2024-08-02T08:42:08.180Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-7097 (GCVE-0-2024-7097)
Vulnerability from cvelistv5
Published
2025-05-30 15:04
Modified
2025-05-30 16:12
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An incorrect authorization vulnerability exists in multiple WSO2 products due to a flaw in the SOAP admin service, which allows user account creation regardless of the self-registration configuration settings. This vulnerability enables malicious actors to create new user accounts without proper authorization.
Exploitation of this flaw could allow an attacker to create multiple low-privileged user accounts, gaining unauthorized access to the system. Additionally, continuous exploitation could lead to system resource exhaustion through mass user creation.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 Open Banking AM |
Version: 1.3.0 < 1.3.0.131 Version: 1.4.0 < 1.4.0.134 Version: 1.5.0 < 1.5.0.136 Version: 2.0.0 < 2.0.0.343 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-7097", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-30T16:05:35.324157Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-30T16:12:44.804Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 Open Banking AM", "vendor": "WSO2", "versions": [ { "lessThan": "1.3.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.3.0.131", "status": "affected", "version": "1.3.0", "versionType": "custom" }, { "lessThan": "1.4.0.134", "status": "affected", "version": "1.4.0", "versionType": "custom" }, { "lessThan": "1.5.0.136", "status": "affected", "version": "1.5.0", "versionType": "custom" }, { "lessThan": "2.0.0.343", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking KM", "vendor": "WSO2", "versions": [ { "lessThan": "1.3.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.3.0.114", "status": "affected", "version": "1.3.0", "versionType": "custom" }, { "lessThan": "1.4.0.130", "status": "affected", "version": "1.4.0", "versionType": "custom" }, { "lessThan": "1.5.0.120", "status": "affected", "version": "1.5.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.3.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.3.0.38", "status": "affected", "version": "5.3.0", "versionType": "custom" }, { "lessThan": "5.5.0.51", "status": "affected", "version": "5.5.0", "versionType": "custom" }, { "lessThan": "5.6.0.72", "status": "affected", "version": "5.6.0", "versionType": "custom" }, { "lessThan": "5.7.0.122", "status": "affected", "version": "5.7.0", "versionType": "custom" }, { "lessThan": "5.9.0.165", "status": "affected", "version": "5.9.0", "versionType": "custom" }, { "lessThan": "5.10.0.312", "status": "affected", "version": "5.10.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.29", "status": "affected", "version": "2.0.0", "versionType": "custom" }, { "lessThan": "2.1.0.39", "status": "affected", "version": "2.1.0", "versionType": "custom" }, { "lessThan": "2.2.0.56", "status": "affected", "version": "2.2.0", "versionType": "custom" }, { "lessThan": "2.5.0.83", "status": "affected", "version": "2.5.0", "versionType": "custom" }, { "lessThan": "2.6.0.142", "status": "affected", "version": "2.6.0", "versionType": "custom" }, { "lessThan": "3.0.0.162", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThan": "3.1.0.294", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.2.0.384", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.16", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.0.0.305", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.166", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.101", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.16", "status": "affected", "version": "4.3.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "vendor": "WSO2", "versions": [ { "lessThan": "5.2.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.2.0.32", "status": "affected", "version": "5.2.0", "versionType": "custom" }, { "lessThan": "5.3.0.33", "status": "affected", "version": "5.3.0", "versionType": "custom" }, { "lessThan": "5.4.0.32", "status": "affected", "version": "5.4.0", "versionType": "custom" }, { "lessThan": "5.4.1.36", "status": "affected", "version": "5.4.1", "versionType": "custom" }, { "lessThan": "5.5.0.50", "status": "affected", "version": "5.5.0", "versionType": "custom" }, { "lessThan": "5.6.0.58", "status": "affected", "version": "5.6.0", "versionType": "custom" }, { "lessThan": "5.7.0.123", "status": "affected", "version": "5.7.0", "versionType": "custom" }, { "lessThan": "5.8.0.106", "status": "affected", "version": "5.8.0", "versionType": "custom" }, { "lessThan": "5.9.0.157", "status": "affected", "version": "5.9.0", "versionType": "custom" }, { "lessThan": "5.10.0.318", "status": "affected", "version": "5.10.0", "versionType": "custom" }, { "lessThan": "5.11.0.365", "status": "affected", "version": "5.11.0", "versionType": "custom" }, { "lessThan": "6.0.0.209", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.188", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "7.0.0.60", "status": "affected", "version": "7.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking IAM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.364", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "WSO2 Enterprise Mobility Manager", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.26", "status": "affected", "version": "2.2.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An incorrect authorization vulnerability exists in multiple WSO2 products due to a flaw in the SOAP admin service, which allows user account creation regardless of the self-registration configuration settings. This vulnerability enables malicious actors to create new user accounts without proper authorization.\u003cbr\u003e\u003cbr\u003eExploitation of this flaw could allow an attacker to create multiple low-privileged user accounts, gaining unauthorized access to the system. Additionally, continuous exploitation could lead to system resource exhaustion through mass user creation.\u003cbr\u003e" } ], "value": "An incorrect authorization vulnerability exists in multiple WSO2 products due to a flaw in the SOAP admin service, which allows user account creation regardless of the self-registration configuration settings. This vulnerability enables malicious actors to create new user accounts without proper authorization.\n\nExploitation of this flaw could allow an attacker to create multiple low-privileged user accounts, gaining unauthorized access to the system. Additionally, continuous exploitation could lead to system resource exhaustion through mass user creation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-30T15:04:09.940Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3574/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3574/#solution\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3...\u003c/a\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "Follow the instructions given on\u00a0 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3574/#solution" } ], "source": { "advisory": "WSO2-2024-3574", "discovery": "INTERNAL" }, "title": "Incorrect Authorization in Multiple WSO2 Products via SOAP Admin Service Allowing Unauthorized User Signup", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-7097", "datePublished": "2025-05-30T15:04:09.940Z", "dateReserved": "2024-07-25T07:26:31.718Z", "dateUpdated": "2025-05-30T16:12:44.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-6839 (GCVE-0-2023-6839)
Vulnerability from cvelistv5
Published
2023-12-15 10:14
Modified
2024-10-08 14:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-209 - Generation of Error Message Containing Sensitive Information
Summary
Due to improper error handling, a REST API resource could expose a server side error containing an internal WSO2 specific package name in the HTTP response.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WSO2 | WSO2 API Manager |
Version: 3.0.0.0 < 3.0.0.15 Version: 3.2.0.0 < 3.2.0.32 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:07.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1334/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-6839", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-14T18:47:07.653315Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:14:43.216Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "repo": "https://github.com/wso2/product-apim", "vendor": "WSO2", "versions": [ { "lessThan": "3.0.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.0.0.15", "status": "affected", "version": "3.0.0.0", "versionType": "custom" }, { "lessThan": "3.2.0.32", "status": "affected", "version": "3.2.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eDue to improper error handling, a REST API resource could expose a server side error containing an internal WSO2 specific package name in the HTTP response.\u003c/p\u003e" } ], "value": "Due to improper error handling, a REST API resource could expose a server side error containing an internal WSO2 specific package name in the HTTP response.\n\n" } ], "impacts": [ { "capecId": "CAPEC-37", "descriptions": [ { "lang": "en", "value": "CAPEC-37 Retrieve Embedded Sensitive Data" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-209", "description": "CWE-209 Generation of Error Message Containing Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-15T10:14:14.676Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1334/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\u003cbr\u003e\u003cbr\u003eCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1334/\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1...\u003c/a\u003e\u003cbr\u003e" } ], "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u00a0 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1334/ \n" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2023-6839", "datePublished": "2023-12-15T10:14:14.676Z", "dateReserved": "2023-12-15T10:13:25.068Z", "dateUpdated": "2024-10-08T14:14:43.216Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-6838 (GCVE-0-2023-6838)
Vulnerability from cvelistv5
Published
2023-12-15 09:50
Modified
2024-08-02 08:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Reflected XSS vulnerability can be exploited by tampering a request parameter in Authentication Endpoint. This can be performed in both authenticated and unauthenticated requests.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 3.1.0.0 < 3.1.0.14 Version: 3.2.0.0 < 3.2.0.10 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:07.910Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1233/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "repo": "https://github.com/wso2/product-apim", "vendor": "WSO2", "versions": [ { "lessThan": "3.1.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.1.0.14", "status": "affected", "version": "3.1.0.0", "versionType": "custom" }, { "lessThan": "3.2.0.10", "status": "affected", "version": "3.2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "repo": "https://github.com/wso2/product-is", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.10.0.5", "status": "affected", "version": "5.10.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 IS as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.10.0.5", "status": "affected", "version": "5.10.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eReflected XSS vulnerability can be exploited by tampering a request parameter in Authentication Endpoint. This can be performed in both authenticated and unauthenticated requests.\u003c/p\u003e" } ], "value": "Reflected XSS vulnerability can be exploited by tampering a request parameter in Authentication Endpoint. This can be performed in both authenticated and unauthenticated requests.\n\n" } ], "impacts": [ { "capecId": "CAPEC-591", "descriptions": [ { "lang": "en", "value": "CAPEC-591 Reflected XSS" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-15T09:50:52.147Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1233/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\u003cbr\u003e\u003cbr\u003eCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1233/\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1...\u003c/a\u003e\u003cbr\u003e" } ], "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u00a0 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1233/ \n" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2023-6838", "datePublished": "2023-12-15T09:50:52.147Z", "dateReserved": "2023-12-15T09:45:13.869Z", "dateUpdated": "2024-08-02T08:42:07.910Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }