Search criteria

8 vulnerabilities found for API Manager Analytics by WSO2

CVE-2025-9804 (GCVE-0-2025-9804)

Vulnerability from cvelistv5 – Published: 2025-10-16 12:33 – Updated: 2025-10-17 16:01
VLAI?
Summary
An improper access control vulnerability exists in multiple WSO2 products due to insufficient permission enforcement in certain internal SOAP Admin Services and System REST APIs. A low-privileged user may exploit this flaw to perform unauthorized operations, including accessing server-level information. This vulnerability affects only internal administrative interfaces. APIs exposed through the WSO2 API Manager's API Gateway remain unaffected.
CWE
  • CWE-284 - Improper Access Control
Assigner
References
Impacted products
Vendor Product Version
WSO2 WSO2 Identity Server as Key Manager Unknown: 0 , < 5.3.0 (custom)
Affected: 5.3.0 , < 5.3.0.41 (custom)
Affected: 5.5.0 , < 5.5.0.53 (custom)
Affected: 5.6.0 , < 5.6.0.75 (custom)
Affected: 5.7.0 , < 5.7.0.125 (custom)
Affected: 5.9.0 , < 5.9.0.176 (custom)
Affected: 5.10.0 , < 5.10.0.359 (custom)
Create a notification for this product.
    WSO2 WSO2 Identity Server Unknown: 0 , < 5.2.0 (custom)
Affected: 5.2.0 , < 5.2.0.34 (custom)
Affected: 5.3.0 , < 5.3.0.36 (custom)
Affected: 5.4.0 , < 5.4.0.34 (custom)
Affected: 5.4.1 , < 5.4.1.38 (custom)
Affected: 5.5.0 , < 5.5.0.52 (custom)
Affected: 5.6.0 , < 5.6.0.60 (custom)
Affected: 5.7.0 , < 5.7.0.126 (custom)
Affected: 5.8.0 , < 5.8.0.110 (custom)
Affected: 5.9.0 , < 5.9.0.169 (custom)
Affected: 5.10.0 , < 5.10.0.369 (custom)
Affected: 5.11.0 , < 5.11.0.413 (custom)
Affected: 6.0.0 , < 6.0.0.244 (custom)
Affected: 6.1.0 , < 6.1.0.243 (custom)
Affected: 7.0.0 , < 7.0.0.118 (custom)
Affected: 7.1.0 , < 7.1.0.25 (custom)
Create a notification for this product.
    WSO2 WSO2 Open Banking KM Unknown: 0 , < 1.4.0 (custom)
Affected: 1.4.0 , < 1.4.0.133 (custom)
Affected: 1.5.0 , < 1.5.0.123 (custom)
Create a notification for this product.
    WSO2 WSO2 Open Banking IAM Unknown: 0 , < 2.0.0 (custom)
Affected: 2.0.0 , < 2.0.0.409 (custom)
Create a notification for this product.
    WSO2 WSO2 Open Banking AM Unknown: 0 , < 1.4.0 (custom)
Affected: 1.4.0 , < 1.4.0.139 (custom)
Affected: 1.5.0 , < 1.5.0.140 (custom)
Affected: 2.0.0 , < 2.0.0.389 (custom)
Create a notification for this product.
    WSO2 WSO2 API Manager Unknown: 0 , < 2.0.0 (custom)
Affected: 2.0.0 , < 2.0.0.31 (custom)
Affected: 2.1.0 , < 2.1.0.40 (custom)
Affected: 2.2.0 , < 2.2.0.59 (custom)
Affected: 2.5.0 , < 2.5.0.85 (custom)
Affected: 2.6.0 , < 2.6.0.146 (custom)
Affected: 3.0.0 , < 3.0.0.176 (custom)
Affected: 3.1.0 , < 3.1.0.340 (custom)
Affected: 3.2.0 , < 3.2.0.441 (custom)
Affected: 3.2.1 , < 3.2.1.61 (custom)
Affected: 4.0.0 , < 4.0.0.361 (custom)
Affected: 4.1.0 , < 4.1.0.224 (custom)
Affected: 4.2.0 , < 4.2.0.162 (custom)
Affected: 4.3.0 , < 4.3.0.75 (custom)
Affected: 4.4.0 , < 4.4.0.39 (custom)
Affected: 4.5.0 , < 4.5.0.23 (custom)
Create a notification for this product.
    WSO2 WSO2 Identity Server Analytics Unknown: 0 , < 5.2.0 (custom)
Affected: 5.2.0 , < 5.2.0.19 (custom)
Affected: 5.3.0 , < 5.3.0.17 (custom)
Affected: 5.5.0 , < 5.5.0.31 (custom)
Affected: 5.6.0 , < 5.6.0.38 (custom)
Create a notification for this product.
    WSO2 API Manager Analytics Unknown: 0 , < 2.0.0 (custom)
Affected: 2.0.0 , < 2.0.0.14 (custom)
Affected: 2.1.0 , < 2.1.0.19 (custom)
Affected: 2.2.0 , < 2.2.0.30 (custom)
Affected: 2.5.0 , < 2.5.0.39 (custom)
Create a notification for this product.
    WSO2 WSO2 Enterprise Integrator Unknown: 0 , < 6.2.0 (custom)
Affected: 6.2.0 , < 6.2.0.62 (custom)
Affected: 6.3.0 , < 6.3.0.70 (custom)
Create a notification for this product.
    WSO2 WSO2 Enterprise Service Bus Analytics Unknown: 0 , < 5.0.0 (custom)
Affected: 5.0.0 , < 5.0.0.13 (custom)
Create a notification for this product.
    WSO2 WSO2 Data Analytics Server Unknown: 0 , < 3.1.0 (custom)
Affected: 3.1.0 , < 3.1.0.20 (custom)
Affected: 3.2.0 , < 3.2.0.33 (custom)
Create a notification for this product.
    WSO2 WSO2 Enterprise Mobility Manager Unknown: 0 , < 2.2.0 (custom)
Affected: 2.2.0 , < 2.2.0.28 (custom)
Create a notification for this product.
    WSO2 WSO2 Universal Gateway Affected: 4.5.0 , < 4.5.0.22 (custom)
Create a notification for this product.
    WSO2 WSO2 API Control Plane Affected: 4.5.0 , < 4.5.0.24 (custom)
Create a notification for this product.
    WSO2 WSO2 Traffic Manager Affected: 4.5.0 , < 4.5.0.22 (custom)
Create a notification for this product.
    WSO2 org.wso2.carbon.extension.identity.authenticator.outbound.totp:org.wso2.carbon.extension.identity.authenticator.totp.connector Affected: 2.0.10 , < 2.0.10.1 (custom)
Affected: 2.0.15 , < 2.0.15.1 (custom)
Affected: 2.0.21 , < 2.0.21.1 (custom)
Affected: 2.0.22 , < 2.0.22.1 (custom)
Affected: 2.1.12 , < 2.1.12.1 (custom)
Affected: 2.1 , < 2.1.1972 (custom)
Affected: 2.2 , < 2.2.24 (custom)
Affected: 2.2 , < 2.2.25 (custom)
Affected: 3.1.0 , < 3.1.0.74 (custom)
Affected: 3.3.6 , < 3.3.6.7 (custom)
Affected: 3.3.26 , < 3.3.26.2 (custom)
Affected: 3.3.35 , < 3.3.35.1 (custom)
Unaffected: 3.3.41 , ≤ * (custom)
Create a notification for this product.
    WSO2 org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.rest.api.util Affected: 6.7.206 , < 6.7.206.567 (custom)
Affected: 6.7.210 , < 6.7.210.63 (custom)
Affected: 9.0.174 , < 9.0.174.522 (custom)
Affected: 9.20.74 , < 9.20.74.379 (custom)
Affected: 9.28.116 , < 9.28.116.360 (custom)
Affected: 9.29.120 , < 9.29.120.184 (custom)
Affected: 9.30.67 , < 9.30.67.109 (custom)
Affected: 9.31.86 , < 9.31.86.71 (custom)
Unaffected: 9.32.133 , ≤ * (custom)
Create a notification for this product.
    WSO2 org.wso2.carbon:org.wso2.carbon.base Affected: 4.4.7 , < 4.4.7.6 (custom)
Affected: 4.4.9 , < 4.4.9.11 (custom)
Affected: 4.4.11 , < 4.4.11.9 (custom)
Affected: 4.4.26 , < 4.4.26.12 (custom)
Affected: 4.4.35 , < 4.4.35.44 (custom)
Affected: 4.5.1 , < 4.5.1.43 (custom)
Affected: 4.6.0 , < 4.6.0.1990 (custom)
Affected: 4.6.1 , < 4.6.1.149 (custom)
Affected: 4.6.2 , < 4.6.2.667 (custom)
Affected: 4.6.3 , < 4.6.3.36 (custom)
Affected: 4.6.4 , < 4.6.4.14 (custom)
Affected: 4.7.1 , < 4.7.1.68 (custom)
Affected: 4.8.1 , < 4.8.1.39 (custom)
Affected: 4.9.0 , < 4.9.0.99 (custom)
Affected: 4.9.26 , < 4.9.26.25 (custom)
Affected: 4.9.27 , < 4.9.27.10 (custom)
Affected: 4.9.28 , < 4.9.28.11 (custom)
Affected: 4.10.9 , < 4.10.9.66 (custom)
Affected: 4.10.42 , < 4.10.42.9 (custom)
Affected: 4.9 , < 4.9.29 (custom)
Affected: 4.10 , < 4.10.94 (custom)
Create a notification for this product.
    WSO2 org.wso2.carbon.identity.framework:org.wso2.carbon.identity.application.mgt Affected: 5.2.0 , < 5.2.0.4 (custom)
Affected: 5.2.2 , < 5.2.2.21 (custom)
Affected: 5.7.5 , < 5.7.5.18 (custom)
Affected: 5.11.148 , < 5.11.148.19 (custom)
Affected: 5.11.256 , < 5.11.256.21 (custom)
Affected: 5.12.153 , < 5.12.153.63 (custom)
Affected: 5.12.387 , < 5.12.387.46 (custom)
Affected: 5.14.97 , < 5.14.97.89 (custom)
Affected: 5.17.5 , < 5.17.5.317 (custom)
Affected: 5.17.118 , < 5.17.118.17 (custom)
Affected: 5.18.187 , < 5.18.187.309 (custom)
Affected: 5.18.248 , < 5.18.248.30 (custom)
Affected: 5.23.8 , < 5.23.8.207 (custom)
Affected: 5.24.8 , < 5.24.8.23 (custom)
Affected: 5.25.92 , < 5.25.92.152 (custom)
Affected: 5.25.705 , < 5.25.705.19 (custom)
Affected: 5.25.713 , < 5.25.713.9 (custom)
Affected: 5.25.724 , < 5.25.724.3 (custom)
Affected: 7.0.78 , < 7.0.78.133 (custom)
Affected: 7.8.23 , < 7.8.23.47 (custom)
Affected: 5.25 , < 5.25.734 (custom)
Unaffected: 7.8.489 , ≤ * (custom)
Create a notification for this product.
    WSO2 org.wso2.carbon:org.wso2.carbon.server.admin Affected: 4.4.7 , < 4.4.7.6 (custom)
Affected: 4.4.9 , < 4.4.9.11 (custom)
Affected: 4.4.11 , < 4.4.11.9 (custom)
Affected: 4.4.26 , < 4.4.26.12 (custom)
Affected: 4.4.32 , < 4.4.32.16 (custom)
Affected: 4.4.35 , < 4.4.35.44 (custom)
Affected: 4.5.1 , < 4.5.1.43 (custom)
Affected: 4.6.0 , < 4.6.0.1990 (custom)
Affected: 4.6.1 , < 4.6.1.149 (custom)
Affected: 4.6.2 , < 4.6.2.667 (custom)
Affected: 4.6.3 , < 4.6.3.36 (custom)
Affected: 4.6.4 , < 4.6.4.14 (custom)
Affected: 4.7.1 , < 4.7.1.68 (custom)
Affected: 4.8.1 , < 4.8.1.39 (custom)
Affected: 4.9.0 , < 4.9.0.99 (custom)
Affected: 4.9.26 , < 4.9.26.25 (custom)
Affected: 4.9.27 , < 4.9.27.10 (custom)
Affected: 4.9.28 , < 4.9.28.11 (custom)
Affected: 4.10.9 , < 4.10.9.66 (custom)
Affected: 4.10.42 , < 4.10.42.9 (custom)
Affected: 4.9 , < 4.9.29 (custom)
Affected: 4.10 , < 4.10.94 (custom)
Create a notification for this product.
    WSO2 org.wso2.carbon.identity.workflow.user:org.wso2.carbon.user.mgt.workflow Affected: 5.1.1 , < 5.1.1.1 (custom)
Affected: 5.1.2 , < 5.1.2.1 (custom)
Affected: 5.1.5 , < 5.1.5.1 (custom)
Affected: 5.3.3 , < 5.3.3.1 (custom)
Affected: 5.4.0 , < 5.4.0.4 (custom)
Affected: 5.4.1 , < 5.4.1.5 (custom)
Affected: 5.6.0 , < 5.6.0.1 (custom)
Unaffected: 5.6.21 , ≤ * (custom)
Create a notification for this product.
Credits
crnković
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-9804",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-16T13:20:20.582589Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-284",
                "description": "CWE-284 Improper Access Control",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-17T16:01:25.350Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Identity Server as Key Manager",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "5.3.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.3.0.41",
              "status": "affected",
              "version": "5.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.5.0.53",
              "status": "affected",
              "version": "5.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.6.0.75",
              "status": "affected",
              "version": "5.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.7.0.125",
              "status": "affected",
              "version": "5.7.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.9.0.176",
              "status": "affected",
              "version": "5.9.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.10.0.359",
              "status": "affected",
              "version": "5.10.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Identity Server",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "5.2.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.2.0.34",
              "status": "affected",
              "version": "5.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.3.0.36",
              "status": "affected",
              "version": "5.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.4.0.34",
              "status": "affected",
              "version": "5.4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.4.1.38",
              "status": "affected",
              "version": "5.4.1",
              "versionType": "custom"
            },
            {
              "lessThan": "5.5.0.52",
              "status": "affected",
              "version": "5.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.6.0.60",
              "status": "affected",
              "version": "5.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.7.0.126",
              "status": "affected",
              "version": "5.7.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.8.0.110",
              "status": "affected",
              "version": "5.8.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.9.0.169",
              "status": "affected",
              "version": "5.9.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.10.0.369",
              "status": "affected",
              "version": "5.10.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.11.0.413",
              "status": "affected",
              "version": "5.11.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.0.0.244",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.1.0.243",
              "status": "affected",
              "version": "6.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.0.0.118",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.1.0.25",
              "status": "affected",
              "version": "7.1.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Open Banking KM",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "1.4.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.4.0.133",
              "status": "affected",
              "version": "1.4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.5.0.123",
              "status": "affected",
              "version": "1.5.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Open Banking IAM",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "2.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.0.409",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Open Banking AM",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "1.4.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.4.0.139",
              "status": "affected",
              "version": "1.4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.5.0.140",
              "status": "affected",
              "version": "1.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.0.389",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 API Manager",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "2.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.0.31",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.1.0.40",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.2.0.59",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.5.0.85",
              "status": "affected",
              "version": "2.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.6.0.146",
              "status": "affected",
              "version": "2.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.0.0.176",
              "status": "affected",
              "version": "3.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.1.0.340",
              "status": "affected",
              "version": "3.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.2.0.441",
              "status": "affected",
              "version": "3.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.2.1.61",
              "status": "affected",
              "version": "3.2.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.0.0.361",
              "status": "affected",
              "version": "4.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.1.0.224",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.2.0.162",
              "status": "affected",
              "version": "4.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.3.0.75",
              "status": "affected",
              "version": "4.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.0.39",
              "status": "affected",
              "version": "4.4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.5.0.23",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Identity Server Analytics",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "5.2.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.2.0.19",
              "status": "affected",
              "version": "5.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.3.0.17",
              "status": "affected",
              "version": "5.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.5.0.31",
              "status": "affected",
              "version": "5.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.6.0.38",
              "status": "affected",
              "version": "5.6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "API Manager Analytics",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "2.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.0.14",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.1.0.19",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.2.0.30",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.5.0.39",
              "status": "affected",
              "version": "2.5.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Enterprise Integrator",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "6.2.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.2.0.62",
              "status": "affected",
              "version": "6.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.3.0.70",
              "status": "affected",
              "version": "6.3.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Enterprise Service Bus Analytics",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "5.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.0.0.13",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Data Analytics Server",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "3.1.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.1.0.20",
              "status": "affected",
              "version": "3.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.2.0.33",
              "status": "affected",
              "version": "3.2.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Enterprise Mobility Manager",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "2.2.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.2.0.28",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Universal Gateway",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "4.5.0.22",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 API Control Plane",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "4.5.0.24",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Traffic Manager",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "4.5.0.22",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "packageName": "org.wso2.carbon.extension.identity.authenticator.outbound.totp:org.wso2.carbon.extension.identity.authenticator.totp.connector",
          "product": "org.wso2.carbon.extension.identity.authenticator.outbound.totp:org.wso2.carbon.extension.identity.authenticator.totp.connector",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "2.0.10.1",
              "status": "affected",
              "version": "2.0.10",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.15.1",
              "status": "affected",
              "version": "2.0.15",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.21.1",
              "status": "affected",
              "version": "2.0.21",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.22.1",
              "status": "affected",
              "version": "2.0.22",
              "versionType": "custom"
            },
            {
              "lessThan": "2.1.12.1",
              "status": "affected",
              "version": "2.1.12",
              "versionType": "custom"
            },
            {
              "lessThan": "2.1.1972",
              "status": "affected",
              "version": "2.1",
              "versionType": "custom"
            },
            {
              "lessThan": "2.2.24",
              "status": "affected",
              "version": "2.2",
              "versionType": "custom"
            },
            {
              "lessThan": "2.2.25",
              "status": "affected",
              "version": "2.2",
              "versionType": "custom"
            },
            {
              "lessThan": "3.1.0.74",
              "status": "affected",
              "version": "3.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.3.6.7",
              "status": "affected",
              "version": "3.3.6",
              "versionType": "custom"
            },
            {
              "lessThan": "3.3.26.2",
              "status": "affected",
              "version": "3.3.26",
              "versionType": "custom"
            },
            {
              "lessThan": "3.3.35.1",
              "status": "affected",
              "version": "3.3.35",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "3.3.41",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "packageName": "org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.rest.api.util",
          "product": "org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.rest.api.util",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "6.7.206.567",
              "status": "affected",
              "version": "6.7.206",
              "versionType": "custom"
            },
            {
              "lessThan": "6.7.210.63",
              "status": "affected",
              "version": "6.7.210",
              "versionType": "custom"
            },
            {
              "lessThan": "9.0.174.522",
              "status": "affected",
              "version": "9.0.174",
              "versionType": "custom"
            },
            {
              "lessThan": "9.20.74.379",
              "status": "affected",
              "version": "9.20.74",
              "versionType": "custom"
            },
            {
              "lessThan": "9.28.116.360",
              "status": "affected",
              "version": "9.28.116",
              "versionType": "custom"
            },
            {
              "lessThan": "9.29.120.184",
              "status": "affected",
              "version": "9.29.120",
              "versionType": "custom"
            },
            {
              "lessThan": "9.30.67.109",
              "status": "affected",
              "version": "9.30.67",
              "versionType": "custom"
            },
            {
              "lessThan": "9.31.86.71",
              "status": "affected",
              "version": "9.31.86",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "9.32.133",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "packageName": "org.wso2.carbon:org.wso2.carbon.base",
          "product": "org.wso2.carbon:org.wso2.carbon.base",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "4.4.7.6",
              "status": "affected",
              "version": "4.4.7",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.9.11",
              "status": "affected",
              "version": "4.4.9",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.11.9",
              "status": "affected",
              "version": "4.4.11",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.26.12",
              "status": "affected",
              "version": "4.4.26",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.35.44",
              "status": "affected",
              "version": "4.4.35",
              "versionType": "custom"
            },
            {
              "lessThan": "4.5.1.43",
              "status": "affected",
              "version": "4.5.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.0.1990",
              "status": "affected",
              "version": "4.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.1.149",
              "status": "affected",
              "version": "4.6.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.2.667",
              "status": "affected",
              "version": "4.6.2",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.3.36",
              "status": "affected",
              "version": "4.6.3",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.4.14",
              "status": "affected",
              "version": "4.6.4",
              "versionType": "custom"
            },
            {
              "lessThan": "4.7.1.68",
              "status": "affected",
              "version": "4.7.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.8.1.39",
              "status": "affected",
              "version": "4.8.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.0.99",
              "status": "affected",
              "version": "4.9.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.26.25",
              "status": "affected",
              "version": "4.9.26",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.27.10",
              "status": "affected",
              "version": "4.9.27",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.28.11",
              "status": "affected",
              "version": "4.9.28",
              "versionType": "custom"
            },
            {
              "lessThan": "4.10.9.66",
              "status": "affected",
              "version": "4.10.9",
              "versionType": "custom"
            },
            {
              "lessThan": "4.10.42.9",
              "status": "affected",
              "version": "4.10.42",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.29",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "lessThan": "4.10.94",
              "status": "affected",
              "version": "4.10",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "packageName": "org.wso2.carbon.identity.framework:org.wso2.carbon.identity.application.mgt",
          "product": "org.wso2.carbon.identity.framework:org.wso2.carbon.identity.application.mgt",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "5.2.0.4",
              "status": "affected",
              "version": "5.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.2.2.21",
              "status": "affected",
              "version": "5.2.2",
              "versionType": "custom"
            },
            {
              "lessThan": "5.7.5.18",
              "status": "affected",
              "version": "5.7.5",
              "versionType": "custom"
            },
            {
              "lessThan": "5.11.148.19",
              "status": "affected",
              "version": "5.11.148",
              "versionType": "custom"
            },
            {
              "lessThan": "5.11.256.21",
              "status": "affected",
              "version": "5.11.256",
              "versionType": "custom"
            },
            {
              "lessThan": "5.12.153.63",
              "status": "affected",
              "version": "5.12.153",
              "versionType": "custom"
            },
            {
              "lessThan": "5.12.387.46",
              "status": "affected",
              "version": "5.12.387",
              "versionType": "custom"
            },
            {
              "lessThan": "5.14.97.89",
              "status": "affected",
              "version": "5.14.97",
              "versionType": "custom"
            },
            {
              "lessThan": "5.17.5.317",
              "status": "affected",
              "version": "5.17.5",
              "versionType": "custom"
            },
            {
              "lessThan": "5.17.118.17",
              "status": "affected",
              "version": "5.17.118",
              "versionType": "custom"
            },
            {
              "lessThan": "5.18.187.309",
              "status": "affected",
              "version": "5.18.187",
              "versionType": "custom"
            },
            {
              "lessThan": "5.18.248.30",
              "status": "affected",
              "version": "5.18.248",
              "versionType": "custom"
            },
            {
              "lessThan": "5.23.8.207",
              "status": "affected",
              "version": "5.23.8",
              "versionType": "custom"
            },
            {
              "lessThan": "5.24.8.23",
              "status": "affected",
              "version": "5.24.8",
              "versionType": "custom"
            },
            {
              "lessThan": "5.25.92.152",
              "status": "affected",
              "version": "5.25.92",
              "versionType": "custom"
            },
            {
              "lessThan": "5.25.705.19",
              "status": "affected",
              "version": "5.25.705",
              "versionType": "custom"
            },
            {
              "lessThan": "5.25.713.9",
              "status": "affected",
              "version": "5.25.713",
              "versionType": "custom"
            },
            {
              "lessThan": "5.25.724.3",
              "status": "affected",
              "version": "5.25.724",
              "versionType": "custom"
            },
            {
              "lessThan": "7.0.78.133",
              "status": "affected",
              "version": "7.0.78",
              "versionType": "custom"
            },
            {
              "lessThan": "7.8.23.47",
              "status": "affected",
              "version": "7.8.23",
              "versionType": "custom"
            },
            {
              "lessThan": "5.25.734",
              "status": "affected",
              "version": "5.25",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "7.8.489",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "packageName": "org.wso2.carbon:org.wso2.carbon.server.admin",
          "product": "org.wso2.carbon:org.wso2.carbon.server.admin",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "4.4.7.6",
              "status": "affected",
              "version": "4.4.7",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.9.11",
              "status": "affected",
              "version": "4.4.9",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.11.9",
              "status": "affected",
              "version": "4.4.11",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.26.12",
              "status": "affected",
              "version": "4.4.26",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.32.16",
              "status": "affected",
              "version": "4.4.32",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.35.44",
              "status": "affected",
              "version": "4.4.35",
              "versionType": "custom"
            },
            {
              "lessThan": "4.5.1.43",
              "status": "affected",
              "version": "4.5.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.0.1990",
              "status": "affected",
              "version": "4.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.1.149",
              "status": "affected",
              "version": "4.6.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.2.667",
              "status": "affected",
              "version": "4.6.2",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.3.36",
              "status": "affected",
              "version": "4.6.3",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.4.14",
              "status": "affected",
              "version": "4.6.4",
              "versionType": "custom"
            },
            {
              "lessThan": "4.7.1.68",
              "status": "affected",
              "version": "4.7.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.8.1.39",
              "status": "affected",
              "version": "4.8.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.0.99",
              "status": "affected",
              "version": "4.9.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.26.25",
              "status": "affected",
              "version": "4.9.26",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.27.10",
              "status": "affected",
              "version": "4.9.27",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.28.11",
              "status": "affected",
              "version": "4.9.28",
              "versionType": "custom"
            },
            {
              "lessThan": "4.10.9.66",
              "status": "affected",
              "version": "4.10.9",
              "versionType": "custom"
            },
            {
              "lessThan": "4.10.42.9",
              "status": "affected",
              "version": "4.10.42",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.29",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "lessThan": "4.10.94",
              "status": "affected",
              "version": "4.10",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "packageName": "org.wso2.carbon.identity.workflow.user:org.wso2.carbon.user.mgt.workflow",
          "product": "org.wso2.carbon.identity.workflow.user:org.wso2.carbon.user.mgt.workflow",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "5.1.1.1",
              "status": "affected",
              "version": "5.1.1",
              "versionType": "custom"
            },
            {
              "lessThan": "5.1.2.1",
              "status": "affected",
              "version": "5.1.2",
              "versionType": "custom"
            },
            {
              "lessThan": "5.1.5.1",
              "status": "affected",
              "version": "5.1.5",
              "versionType": "custom"
            },
            {
              "lessThan": "5.3.3.1",
              "status": "affected",
              "version": "5.3.3",
              "versionType": "custom"
            },
            {
              "lessThan": "5.4.0.4",
              "status": "affected",
              "version": "5.4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.4.1.5",
              "status": "affected",
              "version": "5.4.1",
              "versionType": "custom"
            },
            {
              "lessThan": "5.6.0.1",
              "status": "affected",
              "version": "5.6.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.6.21",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "crnkovi\u0107"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An improper access control vulnerability exists in multiple WSO2 products due to insufficient permission enforcement in certain internal SOAP Admin Services and System REST APIs. A low-privileged user may exploit this flaw to perform unauthorized operations, including accessing server-level information.\u003cbr\u003e\u003cbr\u003eThis vulnerability affects only internal administrative interfaces. APIs exposed through the WSO2 API Manager\u0027s API Gateway remain unaffected.\u003cbr\u003e"
            }
          ],
          "value": "An improper access control vulnerability exists in multiple WSO2 products due to insufficient permission enforcement in certain internal SOAP Admin Services and System REST APIs. A low-privileged user may exploit this flaw to perform unauthorized operations, including accessing server-level information.\n\nThis vulnerability affects only internal administrative interfaces. APIs exposed through the WSO2 API Manager\u0027s API Gateway remain unaffected."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "For WSO2 API Manager"
            }
          ]
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 8.9,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "For WSO2 Identity Server"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-16T12:33:45.426Z",
        "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
        "shortName": "WSO2"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4503/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4503/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4503/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e"
            }
          ],
          "value": "Follow the instructions given on  https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4503/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4503/#solution"
        }
      ],
      "source": {
        "advisory": "WSO2-2025-4503",
        "discovery": "EXTERNAL"
      },
      "title": "Improper Access Control in Multiple WSO2 Products via Internal SOAP Admin Services and System REST APIs",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
    "assignerShortName": "WSO2",
    "cveId": "CVE-2025-9804",
    "datePublished": "2025-10-16T12:33:45.426Z",
    "dateReserved": "2025-09-01T13:11:12.678Z",
    "dateUpdated": "2025-10-17T16:01:25.350Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-9804 (GCVE-0-2025-9804)

Vulnerability from nvd – Published: 2025-10-16 12:33 – Updated: 2025-10-17 16:01
VLAI?
Summary
An improper access control vulnerability exists in multiple WSO2 products due to insufficient permission enforcement in certain internal SOAP Admin Services and System REST APIs. A low-privileged user may exploit this flaw to perform unauthorized operations, including accessing server-level information. This vulnerability affects only internal administrative interfaces. APIs exposed through the WSO2 API Manager's API Gateway remain unaffected.
CWE
  • CWE-284 - Improper Access Control
Assigner
References
Impacted products
Vendor Product Version
WSO2 WSO2 Identity Server as Key Manager Unknown: 0 , < 5.3.0 (custom)
Affected: 5.3.0 , < 5.3.0.41 (custom)
Affected: 5.5.0 , < 5.5.0.53 (custom)
Affected: 5.6.0 , < 5.6.0.75 (custom)
Affected: 5.7.0 , < 5.7.0.125 (custom)
Affected: 5.9.0 , < 5.9.0.176 (custom)
Affected: 5.10.0 , < 5.10.0.359 (custom)
Create a notification for this product.
    WSO2 WSO2 Identity Server Unknown: 0 , < 5.2.0 (custom)
Affected: 5.2.0 , < 5.2.0.34 (custom)
Affected: 5.3.0 , < 5.3.0.36 (custom)
Affected: 5.4.0 , < 5.4.0.34 (custom)
Affected: 5.4.1 , < 5.4.1.38 (custom)
Affected: 5.5.0 , < 5.5.0.52 (custom)
Affected: 5.6.0 , < 5.6.0.60 (custom)
Affected: 5.7.0 , < 5.7.0.126 (custom)
Affected: 5.8.0 , < 5.8.0.110 (custom)
Affected: 5.9.0 , < 5.9.0.169 (custom)
Affected: 5.10.0 , < 5.10.0.369 (custom)
Affected: 5.11.0 , < 5.11.0.413 (custom)
Affected: 6.0.0 , < 6.0.0.244 (custom)
Affected: 6.1.0 , < 6.1.0.243 (custom)
Affected: 7.0.0 , < 7.0.0.118 (custom)
Affected: 7.1.0 , < 7.1.0.25 (custom)
Create a notification for this product.
    WSO2 WSO2 Open Banking KM Unknown: 0 , < 1.4.0 (custom)
Affected: 1.4.0 , < 1.4.0.133 (custom)
Affected: 1.5.0 , < 1.5.0.123 (custom)
Create a notification for this product.
    WSO2 WSO2 Open Banking IAM Unknown: 0 , < 2.0.0 (custom)
Affected: 2.0.0 , < 2.0.0.409 (custom)
Create a notification for this product.
    WSO2 WSO2 Open Banking AM Unknown: 0 , < 1.4.0 (custom)
Affected: 1.4.0 , < 1.4.0.139 (custom)
Affected: 1.5.0 , < 1.5.0.140 (custom)
Affected: 2.0.0 , < 2.0.0.389 (custom)
Create a notification for this product.
    WSO2 WSO2 API Manager Unknown: 0 , < 2.0.0 (custom)
Affected: 2.0.0 , < 2.0.0.31 (custom)
Affected: 2.1.0 , < 2.1.0.40 (custom)
Affected: 2.2.0 , < 2.2.0.59 (custom)
Affected: 2.5.0 , < 2.5.0.85 (custom)
Affected: 2.6.0 , < 2.6.0.146 (custom)
Affected: 3.0.0 , < 3.0.0.176 (custom)
Affected: 3.1.0 , < 3.1.0.340 (custom)
Affected: 3.2.0 , < 3.2.0.441 (custom)
Affected: 3.2.1 , < 3.2.1.61 (custom)
Affected: 4.0.0 , < 4.0.0.361 (custom)
Affected: 4.1.0 , < 4.1.0.224 (custom)
Affected: 4.2.0 , < 4.2.0.162 (custom)
Affected: 4.3.0 , < 4.3.0.75 (custom)
Affected: 4.4.0 , < 4.4.0.39 (custom)
Affected: 4.5.0 , < 4.5.0.23 (custom)
Create a notification for this product.
    WSO2 WSO2 Identity Server Analytics Unknown: 0 , < 5.2.0 (custom)
Affected: 5.2.0 , < 5.2.0.19 (custom)
Affected: 5.3.0 , < 5.3.0.17 (custom)
Affected: 5.5.0 , < 5.5.0.31 (custom)
Affected: 5.6.0 , < 5.6.0.38 (custom)
Create a notification for this product.
    WSO2 API Manager Analytics Unknown: 0 , < 2.0.0 (custom)
Affected: 2.0.0 , < 2.0.0.14 (custom)
Affected: 2.1.0 , < 2.1.0.19 (custom)
Affected: 2.2.0 , < 2.2.0.30 (custom)
Affected: 2.5.0 , < 2.5.0.39 (custom)
Create a notification for this product.
    WSO2 WSO2 Enterprise Integrator Unknown: 0 , < 6.2.0 (custom)
Affected: 6.2.0 , < 6.2.0.62 (custom)
Affected: 6.3.0 , < 6.3.0.70 (custom)
Create a notification for this product.
    WSO2 WSO2 Enterprise Service Bus Analytics Unknown: 0 , < 5.0.0 (custom)
Affected: 5.0.0 , < 5.0.0.13 (custom)
Create a notification for this product.
    WSO2 WSO2 Data Analytics Server Unknown: 0 , < 3.1.0 (custom)
Affected: 3.1.0 , < 3.1.0.20 (custom)
Affected: 3.2.0 , < 3.2.0.33 (custom)
Create a notification for this product.
    WSO2 WSO2 Enterprise Mobility Manager Unknown: 0 , < 2.2.0 (custom)
Affected: 2.2.0 , < 2.2.0.28 (custom)
Create a notification for this product.
    WSO2 WSO2 Universal Gateway Affected: 4.5.0 , < 4.5.0.22 (custom)
Create a notification for this product.
    WSO2 WSO2 API Control Plane Affected: 4.5.0 , < 4.5.0.24 (custom)
Create a notification for this product.
    WSO2 WSO2 Traffic Manager Affected: 4.5.0 , < 4.5.0.22 (custom)
Create a notification for this product.
    WSO2 org.wso2.carbon.extension.identity.authenticator.outbound.totp:org.wso2.carbon.extension.identity.authenticator.totp.connector Affected: 2.0.10 , < 2.0.10.1 (custom)
Affected: 2.0.15 , < 2.0.15.1 (custom)
Affected: 2.0.21 , < 2.0.21.1 (custom)
Affected: 2.0.22 , < 2.0.22.1 (custom)
Affected: 2.1.12 , < 2.1.12.1 (custom)
Affected: 2.1 , < 2.1.1972 (custom)
Affected: 2.2 , < 2.2.24 (custom)
Affected: 2.2 , < 2.2.25 (custom)
Affected: 3.1.0 , < 3.1.0.74 (custom)
Affected: 3.3.6 , < 3.3.6.7 (custom)
Affected: 3.3.26 , < 3.3.26.2 (custom)
Affected: 3.3.35 , < 3.3.35.1 (custom)
Unaffected: 3.3.41 , ≤ * (custom)
Create a notification for this product.
    WSO2 org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.rest.api.util Affected: 6.7.206 , < 6.7.206.567 (custom)
Affected: 6.7.210 , < 6.7.210.63 (custom)
Affected: 9.0.174 , < 9.0.174.522 (custom)
Affected: 9.20.74 , < 9.20.74.379 (custom)
Affected: 9.28.116 , < 9.28.116.360 (custom)
Affected: 9.29.120 , < 9.29.120.184 (custom)
Affected: 9.30.67 , < 9.30.67.109 (custom)
Affected: 9.31.86 , < 9.31.86.71 (custom)
Unaffected: 9.32.133 , ≤ * (custom)
Create a notification for this product.
    WSO2 org.wso2.carbon:org.wso2.carbon.base Affected: 4.4.7 , < 4.4.7.6 (custom)
Affected: 4.4.9 , < 4.4.9.11 (custom)
Affected: 4.4.11 , < 4.4.11.9 (custom)
Affected: 4.4.26 , < 4.4.26.12 (custom)
Affected: 4.4.35 , < 4.4.35.44 (custom)
Affected: 4.5.1 , < 4.5.1.43 (custom)
Affected: 4.6.0 , < 4.6.0.1990 (custom)
Affected: 4.6.1 , < 4.6.1.149 (custom)
Affected: 4.6.2 , < 4.6.2.667 (custom)
Affected: 4.6.3 , < 4.6.3.36 (custom)
Affected: 4.6.4 , < 4.6.4.14 (custom)
Affected: 4.7.1 , < 4.7.1.68 (custom)
Affected: 4.8.1 , < 4.8.1.39 (custom)
Affected: 4.9.0 , < 4.9.0.99 (custom)
Affected: 4.9.26 , < 4.9.26.25 (custom)
Affected: 4.9.27 , < 4.9.27.10 (custom)
Affected: 4.9.28 , < 4.9.28.11 (custom)
Affected: 4.10.9 , < 4.10.9.66 (custom)
Affected: 4.10.42 , < 4.10.42.9 (custom)
Affected: 4.9 , < 4.9.29 (custom)
Affected: 4.10 , < 4.10.94 (custom)
Create a notification for this product.
    WSO2 org.wso2.carbon.identity.framework:org.wso2.carbon.identity.application.mgt Affected: 5.2.0 , < 5.2.0.4 (custom)
Affected: 5.2.2 , < 5.2.2.21 (custom)
Affected: 5.7.5 , < 5.7.5.18 (custom)
Affected: 5.11.148 , < 5.11.148.19 (custom)
Affected: 5.11.256 , < 5.11.256.21 (custom)
Affected: 5.12.153 , < 5.12.153.63 (custom)
Affected: 5.12.387 , < 5.12.387.46 (custom)
Affected: 5.14.97 , < 5.14.97.89 (custom)
Affected: 5.17.5 , < 5.17.5.317 (custom)
Affected: 5.17.118 , < 5.17.118.17 (custom)
Affected: 5.18.187 , < 5.18.187.309 (custom)
Affected: 5.18.248 , < 5.18.248.30 (custom)
Affected: 5.23.8 , < 5.23.8.207 (custom)
Affected: 5.24.8 , < 5.24.8.23 (custom)
Affected: 5.25.92 , < 5.25.92.152 (custom)
Affected: 5.25.705 , < 5.25.705.19 (custom)
Affected: 5.25.713 , < 5.25.713.9 (custom)
Affected: 5.25.724 , < 5.25.724.3 (custom)
Affected: 7.0.78 , < 7.0.78.133 (custom)
Affected: 7.8.23 , < 7.8.23.47 (custom)
Affected: 5.25 , < 5.25.734 (custom)
Unaffected: 7.8.489 , ≤ * (custom)
Create a notification for this product.
    WSO2 org.wso2.carbon:org.wso2.carbon.server.admin Affected: 4.4.7 , < 4.4.7.6 (custom)
Affected: 4.4.9 , < 4.4.9.11 (custom)
Affected: 4.4.11 , < 4.4.11.9 (custom)
Affected: 4.4.26 , < 4.4.26.12 (custom)
Affected: 4.4.32 , < 4.4.32.16 (custom)
Affected: 4.4.35 , < 4.4.35.44 (custom)
Affected: 4.5.1 , < 4.5.1.43 (custom)
Affected: 4.6.0 , < 4.6.0.1990 (custom)
Affected: 4.6.1 , < 4.6.1.149 (custom)
Affected: 4.6.2 , < 4.6.2.667 (custom)
Affected: 4.6.3 , < 4.6.3.36 (custom)
Affected: 4.6.4 , < 4.6.4.14 (custom)
Affected: 4.7.1 , < 4.7.1.68 (custom)
Affected: 4.8.1 , < 4.8.1.39 (custom)
Affected: 4.9.0 , < 4.9.0.99 (custom)
Affected: 4.9.26 , < 4.9.26.25 (custom)
Affected: 4.9.27 , < 4.9.27.10 (custom)
Affected: 4.9.28 , < 4.9.28.11 (custom)
Affected: 4.10.9 , < 4.10.9.66 (custom)
Affected: 4.10.42 , < 4.10.42.9 (custom)
Affected: 4.9 , < 4.9.29 (custom)
Affected: 4.10 , < 4.10.94 (custom)
Create a notification for this product.
    WSO2 org.wso2.carbon.identity.workflow.user:org.wso2.carbon.user.mgt.workflow Affected: 5.1.1 , < 5.1.1.1 (custom)
Affected: 5.1.2 , < 5.1.2.1 (custom)
Affected: 5.1.5 , < 5.1.5.1 (custom)
Affected: 5.3.3 , < 5.3.3.1 (custom)
Affected: 5.4.0 , < 5.4.0.4 (custom)
Affected: 5.4.1 , < 5.4.1.5 (custom)
Affected: 5.6.0 , < 5.6.0.1 (custom)
Unaffected: 5.6.21 , ≤ * (custom)
Create a notification for this product.
Credits
crnković
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-9804",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-16T13:20:20.582589Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-284",
                "description": "CWE-284 Improper Access Control",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-17T16:01:25.350Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Identity Server as Key Manager",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "5.3.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.3.0.41",
              "status": "affected",
              "version": "5.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.5.0.53",
              "status": "affected",
              "version": "5.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.6.0.75",
              "status": "affected",
              "version": "5.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.7.0.125",
              "status": "affected",
              "version": "5.7.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.9.0.176",
              "status": "affected",
              "version": "5.9.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.10.0.359",
              "status": "affected",
              "version": "5.10.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Identity Server",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "5.2.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.2.0.34",
              "status": "affected",
              "version": "5.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.3.0.36",
              "status": "affected",
              "version": "5.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.4.0.34",
              "status": "affected",
              "version": "5.4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.4.1.38",
              "status": "affected",
              "version": "5.4.1",
              "versionType": "custom"
            },
            {
              "lessThan": "5.5.0.52",
              "status": "affected",
              "version": "5.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.6.0.60",
              "status": "affected",
              "version": "5.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.7.0.126",
              "status": "affected",
              "version": "5.7.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.8.0.110",
              "status": "affected",
              "version": "5.8.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.9.0.169",
              "status": "affected",
              "version": "5.9.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.10.0.369",
              "status": "affected",
              "version": "5.10.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.11.0.413",
              "status": "affected",
              "version": "5.11.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.0.0.244",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.1.0.243",
              "status": "affected",
              "version": "6.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.0.0.118",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "7.1.0.25",
              "status": "affected",
              "version": "7.1.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Open Banking KM",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "1.4.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.4.0.133",
              "status": "affected",
              "version": "1.4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.5.0.123",
              "status": "affected",
              "version": "1.5.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Open Banking IAM",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "2.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.0.409",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Open Banking AM",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "1.4.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.4.0.139",
              "status": "affected",
              "version": "1.4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.5.0.140",
              "status": "affected",
              "version": "1.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.0.389",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 API Manager",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "2.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.0.31",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.1.0.40",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.2.0.59",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.5.0.85",
              "status": "affected",
              "version": "2.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.6.0.146",
              "status": "affected",
              "version": "2.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.0.0.176",
              "status": "affected",
              "version": "3.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.1.0.340",
              "status": "affected",
              "version": "3.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.2.0.441",
              "status": "affected",
              "version": "3.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.2.1.61",
              "status": "affected",
              "version": "3.2.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.0.0.361",
              "status": "affected",
              "version": "4.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.1.0.224",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.2.0.162",
              "status": "affected",
              "version": "4.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.3.0.75",
              "status": "affected",
              "version": "4.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.0.39",
              "status": "affected",
              "version": "4.4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.5.0.23",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Identity Server Analytics",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "5.2.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.2.0.19",
              "status": "affected",
              "version": "5.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.3.0.17",
              "status": "affected",
              "version": "5.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.5.0.31",
              "status": "affected",
              "version": "5.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.6.0.38",
              "status": "affected",
              "version": "5.6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "API Manager Analytics",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "2.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.0.14",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.1.0.19",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.2.0.30",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.5.0.39",
              "status": "affected",
              "version": "2.5.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Enterprise Integrator",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "6.2.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.2.0.62",
              "status": "affected",
              "version": "6.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.3.0.70",
              "status": "affected",
              "version": "6.3.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Enterprise Service Bus Analytics",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "5.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.0.0.13",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Data Analytics Server",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "3.1.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.1.0.20",
              "status": "affected",
              "version": "3.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.2.0.33",
              "status": "affected",
              "version": "3.2.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Enterprise Mobility Manager",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "2.2.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.2.0.28",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Universal Gateway",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "4.5.0.22",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 API Control Plane",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "4.5.0.24",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Traffic Manager",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "4.5.0.22",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "packageName": "org.wso2.carbon.extension.identity.authenticator.outbound.totp:org.wso2.carbon.extension.identity.authenticator.totp.connector",
          "product": "org.wso2.carbon.extension.identity.authenticator.outbound.totp:org.wso2.carbon.extension.identity.authenticator.totp.connector",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "2.0.10.1",
              "status": "affected",
              "version": "2.0.10",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.15.1",
              "status": "affected",
              "version": "2.0.15",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.21.1",
              "status": "affected",
              "version": "2.0.21",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.22.1",
              "status": "affected",
              "version": "2.0.22",
              "versionType": "custom"
            },
            {
              "lessThan": "2.1.12.1",
              "status": "affected",
              "version": "2.1.12",
              "versionType": "custom"
            },
            {
              "lessThan": "2.1.1972",
              "status": "affected",
              "version": "2.1",
              "versionType": "custom"
            },
            {
              "lessThan": "2.2.24",
              "status": "affected",
              "version": "2.2",
              "versionType": "custom"
            },
            {
              "lessThan": "2.2.25",
              "status": "affected",
              "version": "2.2",
              "versionType": "custom"
            },
            {
              "lessThan": "3.1.0.74",
              "status": "affected",
              "version": "3.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.3.6.7",
              "status": "affected",
              "version": "3.3.6",
              "versionType": "custom"
            },
            {
              "lessThan": "3.3.26.2",
              "status": "affected",
              "version": "3.3.26",
              "versionType": "custom"
            },
            {
              "lessThan": "3.3.35.1",
              "status": "affected",
              "version": "3.3.35",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "3.3.41",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "packageName": "org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.rest.api.util",
          "product": "org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.rest.api.util",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "6.7.206.567",
              "status": "affected",
              "version": "6.7.206",
              "versionType": "custom"
            },
            {
              "lessThan": "6.7.210.63",
              "status": "affected",
              "version": "6.7.210",
              "versionType": "custom"
            },
            {
              "lessThan": "9.0.174.522",
              "status": "affected",
              "version": "9.0.174",
              "versionType": "custom"
            },
            {
              "lessThan": "9.20.74.379",
              "status": "affected",
              "version": "9.20.74",
              "versionType": "custom"
            },
            {
              "lessThan": "9.28.116.360",
              "status": "affected",
              "version": "9.28.116",
              "versionType": "custom"
            },
            {
              "lessThan": "9.29.120.184",
              "status": "affected",
              "version": "9.29.120",
              "versionType": "custom"
            },
            {
              "lessThan": "9.30.67.109",
              "status": "affected",
              "version": "9.30.67",
              "versionType": "custom"
            },
            {
              "lessThan": "9.31.86.71",
              "status": "affected",
              "version": "9.31.86",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "9.32.133",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "packageName": "org.wso2.carbon:org.wso2.carbon.base",
          "product": "org.wso2.carbon:org.wso2.carbon.base",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "4.4.7.6",
              "status": "affected",
              "version": "4.4.7",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.9.11",
              "status": "affected",
              "version": "4.4.9",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.11.9",
              "status": "affected",
              "version": "4.4.11",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.26.12",
              "status": "affected",
              "version": "4.4.26",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.35.44",
              "status": "affected",
              "version": "4.4.35",
              "versionType": "custom"
            },
            {
              "lessThan": "4.5.1.43",
              "status": "affected",
              "version": "4.5.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.0.1990",
              "status": "affected",
              "version": "4.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.1.149",
              "status": "affected",
              "version": "4.6.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.2.667",
              "status": "affected",
              "version": "4.6.2",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.3.36",
              "status": "affected",
              "version": "4.6.3",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.4.14",
              "status": "affected",
              "version": "4.6.4",
              "versionType": "custom"
            },
            {
              "lessThan": "4.7.1.68",
              "status": "affected",
              "version": "4.7.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.8.1.39",
              "status": "affected",
              "version": "4.8.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.0.99",
              "status": "affected",
              "version": "4.9.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.26.25",
              "status": "affected",
              "version": "4.9.26",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.27.10",
              "status": "affected",
              "version": "4.9.27",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.28.11",
              "status": "affected",
              "version": "4.9.28",
              "versionType": "custom"
            },
            {
              "lessThan": "4.10.9.66",
              "status": "affected",
              "version": "4.10.9",
              "versionType": "custom"
            },
            {
              "lessThan": "4.10.42.9",
              "status": "affected",
              "version": "4.10.42",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.29",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "lessThan": "4.10.94",
              "status": "affected",
              "version": "4.10",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "packageName": "org.wso2.carbon.identity.framework:org.wso2.carbon.identity.application.mgt",
          "product": "org.wso2.carbon.identity.framework:org.wso2.carbon.identity.application.mgt",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "5.2.0.4",
              "status": "affected",
              "version": "5.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.2.2.21",
              "status": "affected",
              "version": "5.2.2",
              "versionType": "custom"
            },
            {
              "lessThan": "5.7.5.18",
              "status": "affected",
              "version": "5.7.5",
              "versionType": "custom"
            },
            {
              "lessThan": "5.11.148.19",
              "status": "affected",
              "version": "5.11.148",
              "versionType": "custom"
            },
            {
              "lessThan": "5.11.256.21",
              "status": "affected",
              "version": "5.11.256",
              "versionType": "custom"
            },
            {
              "lessThan": "5.12.153.63",
              "status": "affected",
              "version": "5.12.153",
              "versionType": "custom"
            },
            {
              "lessThan": "5.12.387.46",
              "status": "affected",
              "version": "5.12.387",
              "versionType": "custom"
            },
            {
              "lessThan": "5.14.97.89",
              "status": "affected",
              "version": "5.14.97",
              "versionType": "custom"
            },
            {
              "lessThan": "5.17.5.317",
              "status": "affected",
              "version": "5.17.5",
              "versionType": "custom"
            },
            {
              "lessThan": "5.17.118.17",
              "status": "affected",
              "version": "5.17.118",
              "versionType": "custom"
            },
            {
              "lessThan": "5.18.187.309",
              "status": "affected",
              "version": "5.18.187",
              "versionType": "custom"
            },
            {
              "lessThan": "5.18.248.30",
              "status": "affected",
              "version": "5.18.248",
              "versionType": "custom"
            },
            {
              "lessThan": "5.23.8.207",
              "status": "affected",
              "version": "5.23.8",
              "versionType": "custom"
            },
            {
              "lessThan": "5.24.8.23",
              "status": "affected",
              "version": "5.24.8",
              "versionType": "custom"
            },
            {
              "lessThan": "5.25.92.152",
              "status": "affected",
              "version": "5.25.92",
              "versionType": "custom"
            },
            {
              "lessThan": "5.25.705.19",
              "status": "affected",
              "version": "5.25.705",
              "versionType": "custom"
            },
            {
              "lessThan": "5.25.713.9",
              "status": "affected",
              "version": "5.25.713",
              "versionType": "custom"
            },
            {
              "lessThan": "5.25.724.3",
              "status": "affected",
              "version": "5.25.724",
              "versionType": "custom"
            },
            {
              "lessThan": "7.0.78.133",
              "status": "affected",
              "version": "7.0.78",
              "versionType": "custom"
            },
            {
              "lessThan": "7.8.23.47",
              "status": "affected",
              "version": "7.8.23",
              "versionType": "custom"
            },
            {
              "lessThan": "5.25.734",
              "status": "affected",
              "version": "5.25",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "7.8.489",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "packageName": "org.wso2.carbon:org.wso2.carbon.server.admin",
          "product": "org.wso2.carbon:org.wso2.carbon.server.admin",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "4.4.7.6",
              "status": "affected",
              "version": "4.4.7",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.9.11",
              "status": "affected",
              "version": "4.4.9",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.11.9",
              "status": "affected",
              "version": "4.4.11",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.26.12",
              "status": "affected",
              "version": "4.4.26",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.32.16",
              "status": "affected",
              "version": "4.4.32",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.35.44",
              "status": "affected",
              "version": "4.4.35",
              "versionType": "custom"
            },
            {
              "lessThan": "4.5.1.43",
              "status": "affected",
              "version": "4.5.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.0.1990",
              "status": "affected",
              "version": "4.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.1.149",
              "status": "affected",
              "version": "4.6.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.2.667",
              "status": "affected",
              "version": "4.6.2",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.3.36",
              "status": "affected",
              "version": "4.6.3",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.4.14",
              "status": "affected",
              "version": "4.6.4",
              "versionType": "custom"
            },
            {
              "lessThan": "4.7.1.68",
              "status": "affected",
              "version": "4.7.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.8.1.39",
              "status": "affected",
              "version": "4.8.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.0.99",
              "status": "affected",
              "version": "4.9.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.26.25",
              "status": "affected",
              "version": "4.9.26",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.27.10",
              "status": "affected",
              "version": "4.9.27",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.28.11",
              "status": "affected",
              "version": "4.9.28",
              "versionType": "custom"
            },
            {
              "lessThan": "4.10.9.66",
              "status": "affected",
              "version": "4.10.9",
              "versionType": "custom"
            },
            {
              "lessThan": "4.10.42.9",
              "status": "affected",
              "version": "4.10.42",
              "versionType": "custom"
            },
            {
              "lessThan": "4.9.29",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "lessThan": "4.10.94",
              "status": "affected",
              "version": "4.10",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "packageName": "org.wso2.carbon.identity.workflow.user:org.wso2.carbon.user.mgt.workflow",
          "product": "org.wso2.carbon.identity.workflow.user:org.wso2.carbon.user.mgt.workflow",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "5.1.1.1",
              "status": "affected",
              "version": "5.1.1",
              "versionType": "custom"
            },
            {
              "lessThan": "5.1.2.1",
              "status": "affected",
              "version": "5.1.2",
              "versionType": "custom"
            },
            {
              "lessThan": "5.1.5.1",
              "status": "affected",
              "version": "5.1.5",
              "versionType": "custom"
            },
            {
              "lessThan": "5.3.3.1",
              "status": "affected",
              "version": "5.3.3",
              "versionType": "custom"
            },
            {
              "lessThan": "5.4.0.4",
              "status": "affected",
              "version": "5.4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.4.1.5",
              "status": "affected",
              "version": "5.4.1",
              "versionType": "custom"
            },
            {
              "lessThan": "5.6.0.1",
              "status": "affected",
              "version": "5.6.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.6.21",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "crnkovi\u0107"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An improper access control vulnerability exists in multiple WSO2 products due to insufficient permission enforcement in certain internal SOAP Admin Services and System REST APIs. A low-privileged user may exploit this flaw to perform unauthorized operations, including accessing server-level information.\u003cbr\u003e\u003cbr\u003eThis vulnerability affects only internal administrative interfaces. APIs exposed through the WSO2 API Manager\u0027s API Gateway remain unaffected.\u003cbr\u003e"
            }
          ],
          "value": "An improper access control vulnerability exists in multiple WSO2 products due to insufficient permission enforcement in certain internal SOAP Admin Services and System REST APIs. A low-privileged user may exploit this flaw to perform unauthorized operations, including accessing server-level information.\n\nThis vulnerability affects only internal administrative interfaces. APIs exposed through the WSO2 API Manager\u0027s API Gateway remain unaffected."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "For WSO2 API Manager"
            }
          ]
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 8.9,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "For WSO2 Identity Server"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-16T12:33:45.426Z",
        "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
        "shortName": "WSO2"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4503/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4503/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4503/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e"
            }
          ],
          "value": "Follow the instructions given on  https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4503/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4503/#solution"
        }
      ],
      "source": {
        "advisory": "WSO2-2025-4503",
        "discovery": "EXTERNAL"
      },
      "title": "Improper Access Control in Multiple WSO2 Products via Internal SOAP Admin Services and System REST APIs",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
    "assignerShortName": "WSO2",
    "cveId": "CVE-2025-9804",
    "datePublished": "2025-10-16T12:33:45.426Z",
    "dateReserved": "2025-09-01T13:11:12.678Z",
    "dateUpdated": "2025-10-17T16:01:25.350Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

VAR-202204-1328

Vulnerability from variot - Updated: 2024-02-13 02:00

A reflected XSS issue exists in the Management Console of several WSO2 products. This affects API Manager 2.2.0, 2.5.0, 2.6.0, 3.0.0, 3.1.0, 3.2.0, and 4.0.0; API Manager Analytics 2.2.0, 2.5.0, and 2.6.0; API Microgateway 2.2.0; Data Analytics Server 3.2.0; Enterprise Integrator 6.2.0, 6.3.0, 6.4.0, 6.5.0, and 6.6.0; IS as Key Manager 5.5.0, 5.6.0, 5.7.0, 5.9.0, and 5.10.0; Identity Server 5.5.0, 5.6.0, 5.7.0, 5.9.0, 5.10.0, and 5.11.0; Identity Server Analytics 5.5.0 and 5.6.0; and WSO2 Micro Integrator 1.0.0. multiple WSO2 A cross-site scripting vulnerability exists in the product.Information may be obtained and information may be tampered with

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1328",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "api manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.5.0"
      },
      {
        "model": "api manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "3.0.0"
      },
      {
        "model": "data analytics server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "3.2.0"
      },
      {
        "model": "identity server as key manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.7.0"
      },
      {
        "model": "identity server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.10.0"
      },
      {
        "model": "api manager analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.5.0"
      },
      {
        "model": "identity server as key manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.10.0"
      },
      {
        "model": "identity server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.5.0"
      },
      {
        "model": "api microgateway",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.2.0"
      },
      {
        "model": "api manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "4.0.0"
      },
      {
        "model": "enterprise integrator",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "6.4.0"
      },
      {
        "model": "enterprise integrator",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "6.3.0"
      },
      {
        "model": "identity server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.6.0"
      },
      {
        "model": "micro integrator",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "1.0.0"
      },
      {
        "model": "identity server analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.5.0"
      },
      {
        "model": "api manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.6.0"
      },
      {
        "model": "api manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "3.2.0"
      },
      {
        "model": "identity server as key manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.5.0"
      },
      {
        "model": "identity server analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.6.0"
      },
      {
        "model": "enterprise integrator",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "6.5.0"
      },
      {
        "model": "api manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.2.0"
      },
      {
        "model": "api manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "3.1.0"
      },
      {
        "model": "api manager analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.6.0"
      },
      {
        "model": "identity server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.9.0"
      },
      {
        "model": "identity server as key manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.6.0"
      },
      {
        "model": "api manager analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.2.0"
      },
      {
        "model": "identity server as key manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.9.0"
      },
      {
        "model": "enterprise integrator",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "6.2.0"
      },
      {
        "model": "identity server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.7.0"
      },
      {
        "model": "identity server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.11.0"
      },
      {
        "model": "enterprise integrator",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "6.6.0"
      },
      {
        "model": "enterprise integrator",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "identity server",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "api microgateway",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "data analytics server",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "api manager analytics",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "api manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-008751"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-29548"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server:5.7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:enterprise_integrator:6.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_microgateway:2.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager:3.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:enterprise_integrator:6.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:enterprise_integrator:6.3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager_analytics:2.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager_analytics:2.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server:5.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_analytics:5.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:data_analytics_server:3.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager:2.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager:3.1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:micro_integrator:1.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_analytics:5.6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.10.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager_analytics:2.6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server:5.11.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager:4.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager:3.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server:5.9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server:5.10.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager:2.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:enterprise_integrator:6.4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:enterprise_integrator:6.6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server:5.6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-29548"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cxosmo",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202204-3932"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2022-29548",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2022-29548",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-421057",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.8,
            "impactScore": 2.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "author": "cve@mitre.org",
            "availabilityImpact": "NONE",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.1,
            "impactScore": 2.5,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 6.1,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2022-29548",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2022-29548",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "cve@mitre.org",
            "id": "CVE-2022-29548",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202204-3932",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-421057",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2022-29548",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-421057"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-29548"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-008751"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202204-3932"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-29548"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-29548"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A reflected XSS issue exists in the Management Console of several WSO2 products. This affects API Manager 2.2.0, 2.5.0, 2.6.0, 3.0.0, 3.1.0, 3.2.0, and 4.0.0; API Manager Analytics 2.2.0, 2.5.0, and 2.6.0; API Microgateway 2.2.0; Data Analytics Server 3.2.0; Enterprise Integrator 6.2.0, 6.3.0, 6.4.0, 6.5.0, and 6.6.0; IS as Key Manager 5.5.0, 5.6.0, 5.7.0, 5.9.0, and 5.10.0; Identity Server 5.5.0, 5.6.0, 5.7.0, 5.9.0, 5.10.0, and 5.11.0; Identity Server Analytics 5.5.0 and 5.6.0; and WSO2 Micro Integrator 1.0.0. multiple WSO2 A cross-site scripting vulnerability exists in the product.Information may be obtained and information may be tampered with",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-29548"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-008751"
      },
      {
        "db": "VULHUB",
        "id": "VHN-421057"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-29548"
      }
    ],
    "trust": 1.8
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-421057",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-421057"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2022-29548",
        "trust": 3.4
      },
      {
        "db": "PACKETSTORM",
        "id": "167587",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-008751",
        "trust": 0.8
      },
      {
        "db": "EXPLOIT-DB",
        "id": "50970",
        "trust": 0.7
      },
      {
        "db": "CXSECURITY",
        "id": "WLB-2022060087",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202204-3932",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-421057",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-29548",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-421057"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-29548"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-008751"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202204-3932"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-29548"
      }
    ]
  },
  "id": "VAR-202204-1328",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-421057"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-02-13T02:00:15.478000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "WSO2 Fixes for Cross-Site Scripting Vulnerabilities in Multiple Products",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=191492"
      },
      {
        "title": "References\nPoC Notes",
        "trust": 0.1,
        "url": "https://github.com/cxosmo/cve-2022-29548 "
      },
      {
        "title": "GoXploitDB",
        "trust": 0.1,
        "url": "https://github.com/vishnusomank/goxploitdb "
      },
      {
        "title": "Goby_POC\nPOC \u6570\u91cf1319",
        "trust": 0.1,
        "url": "https://github.com/z0fhack/goby_poc "
      },
      {
        "title": "PoC in GitHub",
        "trust": 0.1,
        "url": "https://github.com/manas3c/cve-poc "
      },
      {
        "title": "Kenzer Templates [5170] [DEPRECATED]",
        "trust": 0.1,
        "url": "https://github.com/arpsyndicate/kenzer-templates "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2022-29548"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202204-3932"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.1
      },
      {
        "problemtype": "Cross-site scripting (CWE-79) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-421057"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-008751"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-29548"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.2,
        "url": "http://packetstormsecurity.com/files/167587/wso2-management-console-cross-site-scripting.html"
      },
      {
        "trust": 2.6,
        "url": "https://docs.wso2.com/display/security/security+advisory+wso2-2021-1603"
      },
      {
        "trust": 1.1,
        "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/wso2-2021-1603/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29548"
      },
      {
        "trust": 0.6,
        "url": "https://www.exploit-db.com/exploits/50970"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2022-29548/"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/issue/wlb-2022060087"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/79.html"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/cxosmo/cve-2022-29548"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-421057"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-29548"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-008751"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202204-3932"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-29548"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-421057"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-29548"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-008751"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202204-3932"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-29548"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-04-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-421057"
      },
      {
        "date": "2022-04-21T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-29548"
      },
      {
        "date": "2023-07-31T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-008751"
      },
      {
        "date": "2022-04-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202204-3932"
      },
      {
        "date": "2022-04-21T02:15:06.800000",
        "db": "NVD",
        "id": "CVE-2022-29548"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-12-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-421057"
      },
      {
        "date": "2023-11-03T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-29548"
      },
      {
        "date": "2023-07-31T08:19:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-008751"
      },
      {
        "date": "2022-06-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202204-3932"
      },
      {
        "date": "2023-11-03T05:15:29.183000",
        "db": "NVD",
        "id": "CVE-2022-29548"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202204-3932"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0WSO2\u00a0 Cross-site scripting vulnerability in the product",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-008751"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XSS",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202204-3932"
      }
    ],
    "trust": 0.6
  }
}

VAR-202104-0059

Vulnerability from variot - Updated: 2024-02-13 01:51

WSO2 Management Console through 5.10 allows XSS via the carbon/admin/login.jsp msgId parameter. plural WSO2 Product Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. WSO2 Management Console is an application software of American WSO2 Company

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202104-0059",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "identity server as key manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.9.0"
      },
      {
        "model": "identity server as key manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.5.0"
      },
      {
        "model": "identity server analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.5.0"
      },
      {
        "model": "micro integrator",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "1.0.0"
      },
      {
        "model": "api manager analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.5.0"
      },
      {
        "model": "identity server as key manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.6.0"
      },
      {
        "model": "identity server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.10.0"
      },
      {
        "model": "identity server analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.6.0"
      },
      {
        "model": "identity server as key manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.7.0"
      },
      {
        "model": "identity server analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.4.0"
      },
      {
        "model": "enterprise integrator",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "6.6.0"
      },
      {
        "model": "identity server as key manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.10.0"
      },
      {
        "model": "identity server analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.4.1"
      },
      {
        "model": "api manager analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.2.0"
      },
      {
        "model": "api manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "3.2.0"
      },
      {
        "model": "api microgateway",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.2.0"
      },
      {
        "model": "api manager analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.6.0"
      },
      {
        "model": "identity server as key manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "micro integrator",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "api microgateway",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "api manager analytics",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "identity server",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "enterprise integrator",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "identity server analytics",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "api manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016455"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-17453"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.2.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager_analytics:2.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager_analytics:2.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager_analytics:2.6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_microgateway:2.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:enterprise_integrator:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "6.6.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "5.10.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_analytics:5.4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_analytics:5.4.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_analytics:5.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_analytics:5.6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.10.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:micro_integrator:1.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-17453"
      }
    ]
  },
  "cve": "CVE-2020-17453",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2020-17453",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-170633",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.8,
            "impactScore": 2.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 6.1,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2020-17453",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-17453",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202104-168",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-170633",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-17453",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-170633"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-17453"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016455"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-168"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-17453"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "WSO2 Management Console through 5.10 allows XSS via the carbon/admin/login.jsp msgId parameter. plural WSO2 Product Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. WSO2 Management Console is an application software of American WSO2 Company",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-17453"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016455"
      },
      {
        "db": "VULHUB",
        "id": "VHN-170633"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-17453"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-17453",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016455",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-168",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-170633",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-17453",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-170633"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-17453"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016455"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-168"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-17453"
      }
    ]
  },
  "id": "VAR-202104-0059",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-170633"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-02-13T01:51:23.974000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "WSO2-2020-1132",
        "trust": 0.8,
        "url": "https://docs.wso2.com/display/security/security+advisory+wso2-2020-1132"
      },
      {
        "title": "WSO2 Management Console Fixes for cross-site scripting vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146967"
      },
      {
        "title": "https://github.com/karthi-the-hacker/CVE-2020-17453",
        "trust": 0.1,
        "url": "https://github.com/karthi-the-hacker/cve-2020-17453 "
      },
      {
        "title": "CVE-2020-17453",
        "trust": 0.1,
        "url": "https://github.com/jhhax/cve-2020-17453-poc "
      },
      {
        "title": "scalpel\ud83d\udde1\n\u514d\u8d23\u58f0\u660e\n\u68c0\u6d4b\u6a21\u5757\n\u529f\u80fd\u7279\u8272\n\u5feb\u901f\u4f7f\u7528\nPOC\u76f8\u5173\n\u95ee\u9898\u53cd\u9988\n\u76f8\u5173\u8d44\u6599",
        "trust": 0.1,
        "url": "https://github.com/starcrossportal/scalpel "
      },
      {
        "title": "Kenzer Templates [1289]",
        "trust": 0.1,
        "url": "https://github.com/elsfa7-110/kenzer-templates "
      },
      {
        "title": "PoC in GitHub",
        "trust": 0.1,
        "url": "https://github.com/soosmile/poc "
      },
      {
        "title": "Kenzer Templates [5170] [DEPRECATED]",
        "trust": 0.1,
        "url": "https://github.com/arpsyndicate/kenzer-templates "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2020-17453"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016455"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-168"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.1
      },
      {
        "problemtype": "Cross-site scripting (CWE-79) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-170633"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016455"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-17453"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.9,
        "url": "https://github.com/jhhax/cve-2020-17453-poc"
      },
      {
        "trust": 1.8,
        "url": "https://twitter.com/jacksonhhax/status/1374681422678519813"
      },
      {
        "trust": 1.1,
        "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/wso2-2020-1132/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-17453"
      },
      {
        "trust": 0.7,
        "url": "https://docs.wso2.com/display/security/security+advisory+wso2-2020-1132"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/79.html"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/karthi-the-hacker/cve-2020-17453"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-170633"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-17453"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016455"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-168"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-17453"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-170633"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-17453"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016455"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-168"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-17453"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-04-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-170633"
      },
      {
        "date": "2021-04-05T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-17453"
      },
      {
        "date": "2021-12-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-016455"
      },
      {
        "date": "2021-04-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202104-168"
      },
      {
        "date": "2021-04-05T22:15:12.633000",
        "db": "NVD",
        "id": "CVE-2020-17453"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-04-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-170633"
      },
      {
        "date": "2024-01-11T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-17453"
      },
      {
        "date": "2021-12-08T07:12:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-016455"
      },
      {
        "date": "2021-04-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202104-168"
      },
      {
        "date": "2024-01-11T03:15:08.600000",
        "db": "NVD",
        "id": "CVE-2020-17453"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-168"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0WSO2\u00a0 Product \u00a0 Cross-site Scripting Vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016455"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XSS",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202104-168"
      }
    ],
    "trust": 0.6
  }
}

VAR-202008-0561

Vulnerability from variot - Updated: 2024-01-17 20:34

An issue was discovered in certain WSO2 products. A valid Carbon Management Console session cookie may be sent to an attacker-controlled server if the victim submits a crafted Try It request, aka Session Hijacking. This affects API Manager 2.2.0, API Manager Analytics 2.2.0, API Microgateway 2.2.0, Data Analytics Server 3.2.0, Enterprise Integrator through 6.6.0, IS as Key Manager 5.5.0, Identity Server 5.5.0 and 5.8.0, Identity Server Analytics 5.5.0, and IoT Server 3.3.0 and 3.3.1. plural WSO2 The product contains unspecified vulnerabilities.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. There are security vulnerabilities in WSO2 products, which originate from the ability of Carbon management console to send cookie information to attackers. There is a security vulnerability in WSO2 products

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202008-0561",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "iot server",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "wso2",
        "version": "3.3.0"
      },
      {
        "model": "iot server",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "wso2",
        "version": "3.3.1"
      },
      {
        "model": "api manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.2.0"
      },
      {
        "model": "identity server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.8.0"
      },
      {
        "model": "identity server as key manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.5.0"
      },
      {
        "model": "identity server analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.5.0"
      },
      {
        "model": "data analytics server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "3.2.0"
      },
      {
        "model": "identity server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.5.0"
      },
      {
        "model": "enterprise integrator",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "6.6.0"
      },
      {
        "model": "api manager analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.2.0"
      },
      {
        "model": "api microgateway",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.2.0"
      },
      {
        "model": "api manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "api manager analytics",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "api microgateway",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "data analytics server",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "enterprise integrator",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "identity server",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "identity server analytics",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "identity server as key manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010579"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24703"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager:2.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager_analytics:2.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_microgateway:2.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:data_analytics_server:3.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:enterprise_integrator:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "6.6.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server:5.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server:5.8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_analytics:5.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:iot_server:3.3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:iot_server:3.3.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-24703"
      }
    ]
  },
  "cve": "CVE-2020-24703",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2020-24703",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-178608",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 2.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "OTHER",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-010579",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-24703",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "cve@mitre.org",
            "id": "CVE-2020-24703",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202008-1347",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-178608",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178608"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010579"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1347"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24703"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24703"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered in certain WSO2 products. A valid Carbon Management Console session cookie may be sent to an attacker-controlled server if the victim submits a crafted Try It request, aka Session Hijacking. This affects API Manager 2.2.0, API Manager Analytics 2.2.0, API Microgateway 2.2.0, Data Analytics Server 3.2.0, Enterprise Integrator through 6.6.0, IS as Key Manager 5.5.0, Identity Server 5.5.0 and 5.8.0, Identity Server Analytics 5.5.0, and IoT Server 3.3.0 and 3.3.1. plural WSO2 The product contains unspecified vulnerabilities.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. There are security vulnerabilities in WSO2 products, which originate from the ability of Carbon management console to send cookie information to attackers. There is a security vulnerability in WSO2 products",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-24703"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010579"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1347"
      },
      {
        "db": "VULHUB",
        "id": "VHN-178608"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-24703",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010579",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1347",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-178608",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178608"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010579"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1347"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24703"
      }
    ]
  },
  "id": "VAR-202008-0561",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178608"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-01-17T20:34:06.889000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "WSO2-2020-0687",
        "trust": 0.8,
        "url": "https://docs.wso2.com/display/security/security+advisory+wso2-2020-0687"
      },
      {
        "title": "WSO2 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=127962"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010579"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1347"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010579"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24703"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24703"
      },
      {
        "trust": 1.0,
        "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2020/wso2-2020-0687/"
      },
      {
        "trust": 0.7,
        "url": "https://docs.wso2.com/display/security/security+advisory+wso2-2020-0687"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178608"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010579"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1347"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24703"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-178608"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010579"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1347"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24703"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-08-27T00:00:00",
        "db": "VULHUB",
        "id": "VHN-178608"
      },
      {
        "date": "2021-01-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-010579"
      },
      {
        "date": "2020-08-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202008-1347"
      },
      {
        "date": "2020-08-27T16:15:11.583000",
        "db": "NVD",
        "id": "CVE-2020-24703"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-09-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-178608"
      },
      {
        "date": "2021-01-28T07:56:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-010579"
      },
      {
        "date": "2021-01-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202008-1347"
      },
      {
        "date": "2024-01-11T03:15:08.740000",
        "db": "NVD",
        "id": "CVE-2020-24703"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1347"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0WSO2\u00a0 Product vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010579"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1347"
      }
    ],
    "trust": 0.6
  }
}

VAR-202008-0562

Vulnerability from variot - Updated: 2024-01-17 20:32

An issue was discovered in certain WSO2 products. The Try It tool allows Reflected XSS. This affects API Manager 2.2.0, API Manager Analytics 2.2.0, API Microgateway 2.2.0, Data Analytics Server 3.2.0, Enterprise Integrator through 6.6.0, IS as Key Manager 5.5.0, Identity Server 5.5.0 and 5.8.0, Identity Server Analytics 5.5.0, and IoT Server 3.3.0 and 3.3.1. plural WSO2 The product contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. There is a cross-site scripting vulnerability in WSO2 products, which is caused by the lack of correct verification of client data in WEB applications. An attacker can use this vulnerability to execute client code

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202008-0562",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "iot server",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "wso2",
        "version": "3.3.0"
      },
      {
        "model": "iot server",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "wso2",
        "version": "3.3.1"
      },
      {
        "model": "api manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.2.0"
      },
      {
        "model": "identity server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.8.0"
      },
      {
        "model": "identity server as key manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.5.0"
      },
      {
        "model": "identity server analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.5.0"
      },
      {
        "model": "data analytics server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "3.2.0"
      },
      {
        "model": "identity server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.5.0"
      },
      {
        "model": "enterprise integrator",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "6.6.0"
      },
      {
        "model": "api manager analytics",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.2.0"
      },
      {
        "model": "api microgateway",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.2.0"
      },
      {
        "model": "api manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "api manager analytics",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "api microgateway",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "data analytics server",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "enterprise integrator",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "identity server",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "identity server analytics",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      },
      {
        "model": "identity server as key manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "wso2",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010580"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24704"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager:2.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager_analytics:2.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_microgateway:2.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:data_analytics_server:3.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:enterprise_integrator:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "6.6.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server:5.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server:5.8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_analytics:5.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:iot_server:3.3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:iot_server:3.3.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-24704"
      }
    ]
  },
  "cve": "CVE-2020-24704",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2020-24704",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-178609",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.8,
            "impactScore": 2.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 2.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "OTHER",
            "availabilityImpact": "None",
            "baseScore": 6.1,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-010580",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-24704",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "cve@mitre.org",
            "id": "CVE-2020-24704",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202008-1348",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-178609",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178609"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010580"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1348"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24704"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24704"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered in certain WSO2 products. The Try It tool allows Reflected XSS. This affects API Manager 2.2.0, API Manager Analytics 2.2.0, API Microgateway 2.2.0, Data Analytics Server 3.2.0, Enterprise Integrator through 6.6.0, IS as Key Manager 5.5.0, Identity Server 5.5.0 and 5.8.0, Identity Server Analytics 5.5.0, and IoT Server 3.3.0 and 3.3.1. plural WSO2 The product contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. There is a cross-site scripting vulnerability in WSO2 products, which is caused by the lack of correct verification of client data in WEB applications. An attacker can use this vulnerability to execute client code",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-24704"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010580"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1348"
      },
      {
        "db": "VULHUB",
        "id": "VHN-178609"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-24704",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010580",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1348",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-178609",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178609"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010580"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1348"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24704"
      }
    ]
  },
  "id": "VAR-202008-0562",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178609"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-01-17T20:32:06.600000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "WSO2-2020-0685",
        "trust": 0.8,
        "url": "https://docs.wso2.com/display/security/security+advisory+wso2-2020-0685"
      },
      {
        "title": "WSO2 Fixes for cross-site scripting vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=127963"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010580"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1348"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.1
      },
      {
        "problemtype": "Cross-site scripting (CWE-79) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178609"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010580"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24704"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24704"
      },
      {
        "trust": 1.0,
        "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2020/wso2-2020-0685/"
      },
      {
        "trust": 0.7,
        "url": "https://docs.wso2.com/display/security/security+advisory+wso2-2020-0685"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178609"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010580"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1348"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24704"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-178609"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010580"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1348"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24704"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-08-27T00:00:00",
        "db": "VULHUB",
        "id": "VHN-178609"
      },
      {
        "date": "2021-01-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-010580"
      },
      {
        "date": "2020-08-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202008-1348"
      },
      {
        "date": "2020-08-27T16:15:11.677000",
        "db": "NVD",
        "id": "CVE-2020-24704"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-09-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-178609"
      },
      {
        "date": "2021-01-28T07:56:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-010580"
      },
      {
        "date": "2021-01-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202008-1348"
      },
      {
        "date": "2024-01-11T03:15:08.860000",
        "db": "NVD",
        "id": "CVE-2020-24704"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1348"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0WSO2\u00a0 Cross-site scripting vulnerabilities in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010580"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XSS",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1348"
      }
    ],
    "trust": 0.6
  }
}

VAR-202008-0546

Vulnerability from variot - Updated: 2023-12-18 14:04

The Management Console in certain WSO2 products allows XXE attacks during EventReceiver updates. This affects API Manager through 3.0.0, API Manager Analytics 2.2.0 and 2.5.0, API Microgateway 2.2.0, Enterprise Integrator 6.2.0 and 6.3.0, and Identity Server Analytics through 5.6.0. plural WSO2 The product has DTD There is a vulnerability regarding improper restriction of recursive entity references in.Information is obtained and service operation is interrupted (DoS) It may be put into a state. The XXE vulnerability exists in the management interface in WSO2

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202008-0546",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "api manager analytics",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "wso2",
        "version": "2.2.0"
      },
      {
        "model": "api manager analytics",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "wso2",
        "version": "2.5.0"
      },
      {
        "model": "api microgateway",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "wso2",
        "version": "2.2.0"
      },
      {
        "model": "enterprise integrator",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "wso2",
        "version": "6.2.0"
      },
      {
        "model": "enterprise integrator",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "wso2",
        "version": "6.3.0"
      },
      {
        "model": "api manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "3.0.0"
      },
      {
        "model": "identity server analytics",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.6.0"
      },
      {
        "model": "identity server analytics",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "wso2",
        "version": "5.6.0"
      },
      {
        "model": "api manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "wso2",
        "version": "3.0.0"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010364"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24591"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.0.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager_analytics:2.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager_analytics:2.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_microgateway:2.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:enterprise_integrator:6.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:enterprise_integrator:6.3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_analytics:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "5.6.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-24591"
      }
    ]
  },
  "cve": "CVE-2020-24591",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-010364",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "VHN-178485",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.2,
            "impactScore": 5.2,
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 2.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 6.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-010364",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "High",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-24591",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "cve@mitre.org",
            "id": "CVE-2020-24591",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2020-010364",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202008-1084",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-178485",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178485"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010364"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24591"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24591"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1084"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Management Console in certain WSO2 products allows XXE attacks during EventReceiver updates. This affects API Manager through 3.0.0, API Manager Analytics 2.2.0 and 2.5.0, API Microgateway 2.2.0, Enterprise Integrator 6.2.0 and 6.3.0, and Identity Server Analytics through 5.6.0. plural WSO2 The product has DTD There is a vulnerability regarding improper restriction of recursive entity references in.Information is obtained and service operation is interrupted (DoS) It may be put into a state. The XXE vulnerability exists in the management interface in WSO2",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-24591"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010364"
      },
      {
        "db": "VULHUB",
        "id": "VHN-178485"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-24591",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010364",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1084",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-178485",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178485"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010364"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24591"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1084"
      }
    ]
  },
  "id": "VAR-202008-0546",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178485"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T14:04:39.792000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "WSO2-2020-0728",
        "trust": 0.8,
        "url": "https://docs.wso2.com/display/security/security+advisory+wso2-2020-0728"
      },
      {
        "title": "WSO2 XXE Vulnerability fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=126959"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010364"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1084"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-611",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-776",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178485"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010364"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24591"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "https://docs.wso2.com/display/security/security+advisory+wso2-2020-0728"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24591"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-24591"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178485"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010364"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24591"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1084"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-178485"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010364"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24591"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1084"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-08-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-178485"
      },
      {
        "date": "2021-01-07T08:30:12",
        "db": "JVNDB",
        "id": "JVNDB-2020-010364"
      },
      {
        "date": "2020-08-21T20:15:11.093000",
        "db": "NVD",
        "id": "CVE-2020-24591"
      },
      {
        "date": "2020-08-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202008-1084"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-04-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-178485"
      },
      {
        "date": "2021-01-07T08:30:12",
        "db": "JVNDB",
        "id": "JVNDB-2020-010364"
      },
      {
        "date": "2022-04-19T18:28:51.440000",
        "db": "NVD",
        "id": "CVE-2020-24591"
      },
      {
        "date": "2022-04-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202008-1084"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1084"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  WSO2 In the product  DTD Vulnerability in improper restriction of recursive entity references in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-010364"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "code problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202008-1084"
      }
    ],
    "trust": 0.6
  }
}

VAR-202005-0427

Vulnerability from variot - Updated: 2023-12-18 12:27

XXE during an EventPublisher update can occur in Management Console in WSO2 API Manager 3.0.0 and earlier, API Manager Analytics 2.5.0 and earlier, API Microgateway 2.2.0, Enterprise Integrator 6.4.0 and earlier, IS as Key Manager 5.9.0 and earlier, Identity Server 5.9.0 and earlier, and Identity Server Analytics 5.6.0 and earlier. plural WSO2 The product has XML There is a vulnerability in an external entity.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. WSO2 API Manager, etc. are all products of the American WSO2 company. WSO2 API Manager is a set of API lifecycle management solutions. WSO2 Identity Server (IS) is an identity authentication server. WSO2 Enterprise Integrator is an open source hybrid integration platform. A security vulnerability exists in several WSO2 products. Attackers can exploit this vulnerability to obtain local files, cause denial of service, forge server-side requests, scan ports, or cause other damage

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202005-0427",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "api microgateway",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "wso2",
        "version": "2.2.0"
      },
      {
        "model": "identity server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.9.0"
      },
      {
        "model": "api manager analytics",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "2.5.0"
      },
      {
        "model": "identity server analytics",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.6.0"
      },
      {
        "model": "identity server as key manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "5.9.0"
      },
      {
        "model": "api manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "3.0.0"
      },
      {
        "model": "enterprise integrator",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wso2",
        "version": "6.4.0"
      },
      {
        "model": "api manager",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "wso2",
        "version": "3.0.0"
      },
      {
        "model": "api manager analytics",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "wso2",
        "version": "2.5.0"
      },
      {
        "model": "enterprise integrator",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "wso2",
        "version": "6.4.0"
      },
      {
        "model": "identity server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "wso2",
        "version": "5.9.0"
      },
      {
        "model": "identity server analytics",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "wso2",
        "version": "5.6.0"
      },
      {
        "model": "identity server as key manager",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "wso2",
        "version": "5.9.0"
      },
      {
        "model": "api microgateway",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "wso2",
        "version": "2.20"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2020-12719"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005314"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12719"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.0.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_manager_analytics:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.5.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:api_microgateway:2.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:enterprise_integrator:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "6.4.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "5.9.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_analytics:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "5.6.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:wso2:identity_server_as_key_manager:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "5.9.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-12719"
      }
    ]
  },
  "cve": "CVE-2020-12719",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 6.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-005314",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "VHN-165425",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULMON",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CVE-2020-12719",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.2,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "cve@mitre.org",
            "availabilityImpact": "HIGH",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.3,
            "impactScore": 5.8,
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.2,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-005314",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "High",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-12719",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "cve@mitre.org",
            "id": "CVE-2020-12719",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2020-005314",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202005-316",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-165425",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-12719",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-165425"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-12719"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005314"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12719"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12719"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-316"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XXE during an EventPublisher update can occur in Management Console in WSO2 API Manager 3.0.0 and earlier, API Manager Analytics 2.5.0 and earlier, API Microgateway 2.2.0, Enterprise Integrator 6.4.0 and earlier, IS as Key Manager 5.9.0 and earlier, Identity Server 5.9.0 and earlier, and Identity Server Analytics 5.6.0 and earlier. plural WSO2 The product has XML There is a vulnerability in an external entity.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. WSO2 API Manager, etc. are all products of the American WSO2 company. WSO2 API Manager is a set of API lifecycle management solutions. WSO2 Identity Server (IS) is an identity authentication server. WSO2 Enterprise Integrator is an open source hybrid integration platform. A security vulnerability exists in several WSO2 products. Attackers can exploit this vulnerability to obtain local files, cause denial of service, forge server-side requests, scan ports, or cause other damage",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-12719"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005314"
      },
      {
        "db": "VULHUB",
        "id": "VHN-165425"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-12719"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-12719",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005314",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-316",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2021-28009",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-165425",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-12719",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-165425"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-12719"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005314"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12719"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-316"
      }
    ]
  },
  "id": "VAR-202005-0427",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-165425"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:27:30.312000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "WSO2-2019-0665",
        "trust": 0.8,
        "url": "https://docs.wso2.com/display/security/security+advisory+wso2-2019-0665"
      },
      {
        "title": "Multiple WSO2 Product code issue vulnerability fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=118796"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005314"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-316"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-611",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-165425"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005314"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12719"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://docs.wso2.com/display/security/security+advisory+wso2-2019-0665"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12719"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12719"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/611.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181718"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-165425"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-12719"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005314"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12719"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-316"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-165425"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-12719"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005314"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12719"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-316"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-05-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-165425"
      },
      {
        "date": "2020-05-08T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-12719"
      },
      {
        "date": "2020-06-11T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-005314"
      },
      {
        "date": "2020-05-08T00:15:12.033000",
        "db": "NVD",
        "id": "CVE-2020-12719"
      },
      {
        "date": "2020-05-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202005-316"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-05-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-165425"
      },
      {
        "date": "2020-05-14T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-12719"
      },
      {
        "date": "2020-06-11T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-005314"
      },
      {
        "date": "2020-05-14T15:58:08.130000",
        "db": "NVD",
        "id": "CVE-2020-12719"
      },
      {
        "date": "2020-05-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202005-316"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-316"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  WSO2 In the product  XML External entity vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005314"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "code problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-316"
      }
    ],
    "trust": 0.6
  }
}