By exploiting this vulnerability, attackers can manipulate browser-displayed error messages, enabling social engineering attacks through deceptive or misleading content.
Metrics
Affected Vendors & Products
Solution
Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/#solution
Workaround
No workaround given by the vendor.
Tue, 23 Sep 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A content spoofing vulnerability exists in multiple WSO2 products due to improper error message handling. Under certain conditions, error messages are passed through URL parameters without validation, allowing malicious actors to inject arbitrary content into the UI. By exploiting this vulnerability, attackers can manipulate browser-displayed error messages, enabling social engineering attacks through deceptive or misleading content. | |
Title | Content Spoofing in Multiple WSO2 Products via Error Message Injection | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2025-09-23T16:37:58.340Z
Reserved: 2024-07-01T12:48:38.456Z
Link: CVE-2024-6429

No data.

Status : Received
Published: 2025-09-23T17:15:30.643
Modified: 2025-09-23T17:15:30.643
Link: CVE-2024-6429

No data.

No data.