VYPR
Medium severity6.1NVD Advisory· Published Apr 16, 2026· Updated Apr 23, 2026

CVE-2025-6024

CVE-2025-6024

Description

The authentication endpoint fails to encode user-supplied input before rendering it in the web page, allowing for script injection. An attacker can leverage this by injecting malicious scripts into the authentication endpoint. This can result in the user's browser being redirected to a malicious website, manipulation of the web page's user interface, or the retrieval of information from the browser. However, session hijacking is not possible due to the httpOnly flag protecting session-related cookies.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in WSO2 authentication endpoint due to missing output encoding; session cookies are httpOnly-protected.

Vulnerability

Overview

The authentication endpoint in multiple WSO2 products fails to encode user-supplied input before rendering it in the web page, leading to a reflected cross-site scripting (XSS) vulnerability [1]. This occurs because the application does not properly sanitize or escape input that is reflected back to the user's browser, allowing an attacker to inject arbitrary HTML or JavaScript [1].

Exploitation

An attacker can exploit this by crafting a malicious URL containing a script payload and tricking a user into clicking it. No authentication is required to trigger the vulnerability, but user interaction is necessary (e.g., clicking a link). The injected script executes in the context of the affected WSO2 endpoint, enabling the attacker to manipulate the page content, redirect the browser, or retrieve information from the user's browser [1].

Impact

Successful exploitation allows an attacker to perform actions such as redirecting the user to a malicious site, altering the UI of the authentication page, or stealing non-sensitive browser data. However, because all session-related cookies are set with the httpOnly flag, session hijacking or similar attacks are not possible [1]. The CVSS score of 6.1 (Medium) reflects the limited impact on confidentiality and integrity due to the httpOnly protection [1].

Mitigation

WSO2 has released updates for all affected product versions. Users should migrate to the latest unaffected version or apply the specified update level for their product. For example, WSO2 API Manager 4.1.0 requires update level 238, and WSO2 Identity Server 5.11.0 requires update level 405 [1]. No workaround is provided; updating is the recommended solution.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.