Description
In Webhook API invocations, the component accepts user-supplied input for HTTP request headers without sufficient validation or sanitization, allowing these headers to be injected into HTTP responses. By exploiting this vulnerability, a malicious actor can inject or overwrite arbitrary HTTP response headers. This can lead to various adverse effects, including the manipulation of browser caching, alteration of security-related headers, and the injection of sensitive information such as cookie values, potentially enabling session hijacking or other malicious activities.
Problem types
Product status
Any version before 4.1.0
4.1.0 (custom) before 4.1.0.218
4.2.0 (custom) before 4.2.0.164
4.3.0 (custom) before 4.3.0.74
4.4.0 (custom) before 4.4.0.38
4.5.0 (custom) before 4.5.0.20
4.5.0 (custom) before 4.5.0.19
4.5.0 (custom) before 4.5.0.19
4.5.0 (custom) before 4.5.0.21
9.20.74 (custom) before 9.20.74.374
9.28.116 (custom) before 9.28.116.363
9.29.120 (custom) before 9.29.120.181
9.30.67 (custom) before 9.30.67.104
9.31.86 (custom) before 9.31.86.64
9.32.2 (custom)
9.20.74 (custom) before 9.20.74.374
9.28.116 (custom) before 9.28.116.363
9.29.120 (custom) before 9.29.120.181
9.30.67 (custom) before 9.30.67.104
9.31.86 (custom) before 9.31.86.64
9.32.2 (custom)
References
security.docs.wso2.com/...ty-advisories/2026/WSO2-2025-4410/