{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T03:49:25.422","vulnerabilities":[{"cve":{"id":"CVE-2024-5848","sourceIdentifier":"ed10eef1-636d-4fbe-9993-6890dfa878f8","published":"2025-02-27T08:15:30.887","lastModified":"2025-10-06T13:55:43.690","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to improper input validation. User-supplied data is directly included in server responses from vulnerable service endpoints without proper sanitization or encoding, allowing an attacker to inject malicious JavaScript.\n\nSuccessful exploitation could lead to UI manipulation, redirection to malicious websites, or data exfiltration from the browser. While session-related sensitive cookies are protected with the httpOnly flag, mitigating session hijacking risks, the impact may vary depending on gateway-level service restrictions."},{"lang":"es","value":"Existe una vulnerabilidad de cross-site scripting (XSS) reflejado en varios productos WSO2 debido a una validación de entrada incorrecta. Los datos proporcionados por el usuario se incluyen directamente en las respuestas del servidor desde los endpoints de servicio vulnerables sin la debida depuración o codificación, lo que permite a un atacante inyectar JavaScript malicioso. Una explotación exitosa podría llevar a la manipulación de la interfaz de usuario, la redirección a sitios web maliciosos o la exfiltración de datos del navegador. Si bien las cookies confidenciales relacionadas con la sesión están protegidas con el indicador httpOnly, lo que mitiga los riesgos de secuestro de sesión, el impacto puede variar según las restricciones del servicio a nivel de puerta de enlace."}],"metrics":{"cvssMetricV31":[{"source":"ed10eef1-636d-4fbe-9993-6890dfa878f8","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"ed10eef1-636d-4fbe-9993-6890dfa878f8","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:api_manager:3.1.0:*:*:*:*:*:*:*","matchCriteriaId":"1344FB79-0796-445C-A8F3-C03E995925D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:api_manager:3.2.0:*:*:*:*:*:*:*","matchCriteriaId":"E31E32CD-497E-4EF5-B3FC-8718EE06EDAD"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:api_manager:3.2.1:*:*:*:*:*:*:*","matchCriteriaId":"B58251E8-606B-47C8-8E50-9F9FC8C179BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:api_manager:4.0.0:*:*:*:*:*:*:*","matchCriteriaId":"E21D7ABF-C328-425D-B914-618C7628220B"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:api_manager:4.1.0:-:*:*:*:*:*:*","matchCriteriaId":"51465410-6B7C-40FD-A1AB-A14F650A6AC8"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:api_manager:4.2.0:-:*:*:*:*:*:*","matchCriteriaId":"851470CC-22AB-43E4-9CC6-5E22D49B3572"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:api_manager:4.3.0:-:*:*:*:*:*:*","matchCriteriaId":"9EBAB99E-6F0F-4CE9-A954-E8878826304C"}]}]}],"references":[{"url":"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3450/","source":"ed10eef1-636d-4fbe-9993-6890dfa878f8","tags":["Vendor Advisory"]}]}}]}