Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-3289 | Multiple WSO2 products have been identified as vulnerable due to improper output encoding, a Stored Cross Site Scripting (XSS) attack can be carried out by an attacker injecting a malicious payload into the Registry feature of the Management Console. |
![]() |
GHSA-rfq3-wpjh-ppvg | WSO2 Registry Stored Cross Site Scripting (XSS) vulnerability |
Solution
For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly. Community users may apply the relevant fixes to the product based on the public fix(s) advertised inĀ https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/
Workaround
No workaround given by the vendor.
No history.

Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2024-08-02T08:42:08.416Z
Reserved: 2023-12-18T08:23:45.214Z
Link: CVE-2023-6911

No data.

Status : Modified
Published: 2023-12-18T09:15:05.810
Modified: 2024-11-21T08:44:49.210
Link: CVE-2023-6911

No data.

No data.