{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T00:48:26.453","vulnerabilities":[{"cve":{"id":"CVE-2024-3509","sourceIdentifier":"ed10eef1-636d-4fbe-9993-6890dfa878f8","published":"2025-06-02T17:15:22.090","lastModified":"2025-10-06T13:48:27.223","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A stored cross-site scripting (XSS) vulnerability exists in the Management Console of multiple WSO2 products due to insufficient input validation in the Rich Text Editor within the registry section.\nTo exploit this vulnerability, a malicious actor must have a valid user account with administrative access to the Management Console. If successful, the actor could inject persistent JavaScript payloads, enabling the theft of user data or execution of unauthorized actions on behalf of other users.\n\nWhile this issue enables persistent client-side script execution, session-related cookies remain protected with the httpOnly flag, preventing session hijacking."},{"lang":"es","value":"Existe una vulnerabilidad de cross site scripting (XSS) almacenado en la consola de administración de varios productos WSO2 debido a una validación de entrada insuficiente en el editor de texto enriquecido de la sección de registro. Para explotar esta vulnerabilidad, un agente malicioso debe tener una cuenta de usuario válida con acceso administrativo a la consola de administración. De tener éxito, el agente podría inyectar payloads persistentes de JavaScript, lo que permite el robo de datos de usuario o la ejecución de acciones no autorizadas en nombre de otros usuarios. Si bien este problema permite la ejecución persistente de scripts del lado del cliente, las cookies de sesión permanecen protegidas con el indicador httpOnly, lo que evita el secuestro de sesión."}],"metrics":{"cvssMetricV31":[{"source":"ed10eef1-636d-4fbe-9993-6890dfa878f8","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":2.7}]},"weaknesses":[{"source":"ed10eef1-636d-4fbe-9993-6890dfa878f8","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:api_manager:3.2.0:*:*:*:*:*:*:*","matchCriteriaId":"E31E32CD-497E-4EF5-B3FC-8718EE06EDAD"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:api_manager:3.2.1:*:*:*:*:*:*:*","matchCriteriaId":"B58251E8-606B-47C8-8E50-9F9FC8C179BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:api_manager:4.0.0:*:*:*:*:*:*:*","matchCriteriaId":"E21D7ABF-C328-425D-B914-618C7628220B"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:api_manager:4.1.0:-:*:*:*:*:*:*","matchCriteriaId":"51465410-6B7C-40FD-A1AB-A14F650A6AC8"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:api_manager:4.2.0:-:*:*:*:*:*:*","matchCriteriaId":"851470CC-22AB-43E4-9CC6-5E22D49B3572"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:api_manager:4.3.0:-:*:*:*:*:*:*","matchCriteriaId":"9EBAB99E-6F0F-4CE9-A954-E8878826304C"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:enterprise_integrator:6.6.0:*:*:*:*:*:*:*","matchCriteriaId":"E4A07C73-3E6B-4CF9-BEB9-39C6081C0332"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:identity_server:5.10.0:*:*:*:*:*:*:*","matchCriteriaId":"F4F126CA-A2F9-44F4-968B-DF71765869E5"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:identity_server:5.11.0:*:*:*:*:*:*:*","matchCriteriaId":"2153AECE-020A-4C01-B2A6-F9F5D98E7EBE"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:identity_server:6.0.0:*:*:*:*:*:*:*","matchCriteriaId":"7B81C488-69D0-4A5C-AEED-31869C1BF5CA"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:identity_server:6.1.0:*:*:*:*:*:*:*","matchCriteriaId":"65CD2558-C60C-4296-8E96-D4D804C598F0"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:identity_server:7.0.0:*:*:*:*:*:*:*","matchCriteriaId":"B8DF49C6-F2F6-4229-982E-0C0559265203"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:identity_server_as_key_manager:5.10.0:*:*:*:*:*:*:*","matchCriteriaId":"6BB34405-A2F1-461A-B51B-E103BB3680A1"}]}]}],"references":[{"url":"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-2701","source":"ed10eef1-636d-4fbe-9993-6890dfa878f8","tags":["Vendor Advisory"]}]}}]}