A reflected cross-site scripting (XSS) vulnerability exists in the authentication endpoints of multiple WSO2 products due to a lack of output encoding. A malicious actor can inject arbitrary JavaScript payloads into the authentication endpoint, which are reflected back in the response, enabling browser-based attacks.
Exploitation may result in redirection to malicious websites, UI manipulation, or unauthorized data access from the victim’s browser. However, session-related cookies are protected with the httpOnly flag, which mitigates session hijacking via this vector.
| Software | From | Fixed in |
|---|---|---|
| wso2 / api_control_plane | 4.5.0 | 4.5.0.x |
| wso2 / api_manager | 4.2.0 | 4.2.0.x |
| wso2 / api_manager | 4.3.0 | 4.3.0.x |
| wso2 / api_manager | 4.4.0 | 4.4.0.x |
| wso2 / api_manager | 4.5.0 | 4.5.0.x |
| wso2 / identity_server | 6.0.0 | 6.0.0.x |
| wso2 / identity_server | 6.1.0 | 6.1.0.x |
| wso2 / identity_server | 7.0.0 | 7.0.0.x |
| wso2 / identity_server | 7.1.0 | 7.1.0.x |