An attacker can leverage this by injecting malicious scripts into the authentication endpoint. This can result in the user's browser being redirected to a malicious website, manipulation of the web page's user interface, or the retrieval of information from the browser. However, session hijacking is not possible due to the httpOnly flag protecting session-related cookies.
Project Subscriptions
No advisories yet.
Solution
Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2026/WSO2-2025-4251/#solution
Workaround
No workaround given by the vendor.
Thu, 16 Apr 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wso2
Wso2 wso2 Api Manager Wso2 wso2 Identity Server |
|
| Vendors & Products |
Wso2
Wso2 wso2 Api Manager Wso2 wso2 Identity Server |
Thu, 16 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The authentication endpoint fails to encode user-supplied input before rendering it in the web page, allowing for script injection. An attacker can leverage this by injecting malicious scripts into the authentication endpoint. This can result in the user's browser being redirected to a malicious website, manipulation of the web page's user interface, or the retrieval of information from the browser. However, session hijacking is not possible due to the httpOnly flag protecting session-related cookies. | |
| Title | Cross-Site Scripting via Authentication Endpoint in Multiple WSO2 Products Allows Redirection to Malicious Websites | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2026-04-16T12:30:22.824Z
Reserved: 2025-06-12T09:23:00.709Z
Link: CVE-2025-6024
No data.
Status : Received
Published: 2026-04-16T10:16:14.243
Modified: 2026-04-16T10:16:14.243
Link: CVE-2025-6024
No data.
OpenCVE Enrichment
Updated: 2026-04-16T12:30:05Z