{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T07:58:43.082","vulnerabilities":[{"cve":{"id":"CVE-2024-5962","sourceIdentifier":"ed10eef1-636d-4fbe-9993-6890dfa878f8","published":"2025-05-22T20:15:27.203","lastModified":"2025-10-06T13:57:57.430","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A reflected cross-site scripting (XSS) vulnerability exists in the authentication endpoint of multiple WSO2 products due to missing output encoding of user-supplied input. A malicious actor can exploit this vulnerability to inject arbitrary JavaScript into the authentication flow, potentially leading to UI modifications, redirections to malicious websites, or data exfiltration from the browser.\n\nWhile this issue could allow an attacker to manipulate the user’s browser, session-related sensitive cookies remain protected with the httpOnly flag, preventing session hijacking."},{"lang":"es","value":"Existe una vulnerabilidad de Cross-Site Scripting (XSS) Reflejado en el endpoint de autenticación de varios productos WSO2 debido a la falta de codificación de salida de la entrada proporcionada por el usuario. Un atacante puede explotar esta vulnerabilidad para inyectar JavaScript arbitrario en el flujo de autenticación, lo que podría provocar modificaciones de la interfaz de usuario, redirecciones a sitios web maliciosos o la exfiltración de datos del navegador. Si bien este problema podría permitir a un atacante manipular el navegador del usuario, las cookies sensibles de sesión permanecen protegidas con el indicador httpOnly, lo que evita el secuestro de sesión."}],"metrics":{"cvssMetricV31":[{"source":"ed10eef1-636d-4fbe-9993-6890dfa878f8","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"ed10eef1-636d-4fbe-9993-6890dfa878f8","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:api_manager:4.2.0:-:*:*:*:*:*:*","matchCriteriaId":"851470CC-22AB-43E4-9CC6-5E22D49B3572"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:api_manager:4.3.0:-:*:*:*:*:*:*","matchCriteriaId":"9EBAB99E-6F0F-4CE9-A954-E8878826304C"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:identity_server:6.0.0:-:*:*:*:*:*:*","matchCriteriaId":"32CE7893-AD1A-49E5-BD1A-5E9C2DEB8764"},{"vulnerable":true,"criteria":"cpe:2.3:a:wso2:identity_server:6.1.0:-:*:*:*:*:*:*","matchCriteriaId":"EA76533A-5BED-4BDC-B348-EB3D3FDFB110"}]}]}],"references":[{"url":"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3443/","source":"ed10eef1-636d-4fbe-9993-6890dfa878f8","tags":["Vendor Advisory"]}]}}]}