Home

Description

A reflected cross-site scripting (XSS) vulnerability exists in the management console of multiple WSO2 products due to improper output encoding. By tampering with specific parameters, a malicious actor can inject arbitrary JavaScript into the response, leading to reflected XSS. Successful exploitation could result in UI manipulation, redirection to malicious websites, or data theft from the browser. However, session-related sensitive cookies are protected with the httpOnly flag, which mitigates the risk of session hijacking.

PUBLISHED Reserved 2025-09-22 | Published 2025-11-05 | Updated 2025-11-05 | Assigner WSO2




MEDIUM: 5.2CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unaffected

Any version before 2.0.0
unknown

2.0.0 (custom) before 2.0.0.413
affected

Default status
unaffected

Any version before 3.1.0
unknown

3.1.0 (custom) before 3.1.0.344
affected

3.2.0 (custom) before 3.2.0.445
affected

3.2.1 (custom) before 3.2.1.65
affected

4.0.0 (custom) before 4.0.0.365
affected

4.1.0 (custom) before 4.1.0.227
affected

4.2.0 (custom) before 4.2.0.167
affected

4.3.0 (custom) before 4.3.0.79
affected

4.4.0 (custom) before 4.4.0.43
affected

4.5.0 (custom) before 4.5.0.26
affected

Default status
unaffected

Any version before 5.10.0
unknown

5.10.0 (custom) before 5.10.0.373
affected

5.11.0 (custom) before 5.11.0.417
affected

6.0.0 (custom) before 6.0.0.247
affected

6.1.0 (custom) before 6.1.0.246
affected

7.0.0 (custom) before 7.0.0.122
affected

7.1.0 (custom) before 7.1.0.29
affected

Default status
unaffected

Any version before 2.0.0
unknown

2.0.0 (custom) before 2.0.0.393
affected

Default status
unaffected

Any version before 5.10.0
unknown

5.10.0 (custom) before 5.10.0.363
affected

Default status
unaffected

Any version before 6.6.0
unknown

6.6.0 (custom) before 6.6.0.223
affected

Default status
unaffected

4.5.0 (custom) before 4.5.0.27
affected

Default status
unaffected

4.5.0 (custom) before 4.5.0.25
affected

Default status
unaffected

4.5.0 (custom) before 4.5.0.25
affected

Default status
unknown

4.7.32 (custom) before 4.7.32.14
affected

4.7.35 (custom) before 4.7.35.11
affected

4.7.39 (custom) before 4.7.39.9
affected

4.7.51 (custom) before 4.7.51.4
affected

4.8.3 (custom) before 4.8.3.9
affected

4.8.13 (custom) before 4.8.13.6
affected

4.8.32 (custom) before 4.8.32.3
affected

4.8.36 (custom) before 4.8.36.1
affected

4.8.43 (custom) before 4.8.43.1
affected

4.8.47 (custom)
unaffected

Default status
unknown

4.7.24 (custom) before 4.7.24.7
affected

4.7.32 (custom) before 4.7.32.14
affected

4.7.33 (custom) before 4.7.33.13
affected

4.7.35 (custom) before 4.7.35.11
affected

4.7.39 (custom) before 4.7.39.9
affected

4.7.51 (custom) before 4.7.51.4
affected

4.8.3 (custom) before 4.8.3.9
affected

4.8.9 (custom) before 4.8.9.5
affected

4.8.12 (custom) before 4.8.12.5
affected

4.8.13 (custom) before 4.8.13.6
affected

4.8.24 (custom) before 4.8.24.3
affected

4.8.32 (custom) before 4.8.32.3
affected

4.8.36 (custom) before 4.8.36.1
affected

4.8.43 (custom) before 4.8.43.1
affected

4.8.47 (custom)
unaffected

Default status
unknown

4.8.19 (custom) before 4.8.19.5
affected

4.8.21 (custom) before 4.8.21.9
affected

4.8.28 (custom) before 4.8.28.3
affected

4.8.30 (custom) before 4.8.30.3
affected

4.8.32 (custom) before 4.8.32.1
affected

4.8.33 (custom) before 4.8.33.3
affected

4.8.34 (custom) before 4.8.34.3
affected

4.8.35 (custom)
affected

Default status
unknown

6.4.2 (custom) before 6.4.2.165
affected

6.4.111 (custom) before 6.4.111.155
affected

6.4.176 (custom) before 6.4.176.28
affected

6.4.180 (custom) before 6.4.180.12
affected

6.9.6 (custom) before 6.9.6.26
affected

6.13.16 (custom) before 6.13.16.19
affected

6.13.19 (custom) before 6.13.19.12
affected

6.13.27 (custom) before 6.13.27.5
affected

6.13.38 (custom)
unaffected

7.0.349 (custom)
unaffected

Credits

crnković reporter

References

security.docs.wso2.com/...ty-advisories/2025/WSO2-2025-4486/ vendor-advisory

cve.org (CVE-2025-10853)

nvd.nist.gov (CVE-2025-10853)

Download JSON