By exploiting this vulnerability, attackers can manipulate browser-displayed error messages, enabling social engineering attacks through deceptive or misleading content.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-55023 | WSO2 Identity Server Apps allows content spoofing in logs |
![]() |
GHSA-r6f3-55wj-g9p3 | WSO2 Identity Server Apps allows content spoofing in logs |
Solution
Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/#solution
Workaround
No workaround given by the vendor.
Mon, 06 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:wso2:api_manager:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.0.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.1.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.2.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.3.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.4.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:identity_server:5.10.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:identity_server:5.11.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:identity_server:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:identity_server:6.1.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:identity_server:7.0.0:*:*:*:*:*:*:* |
Thu, 25 Sep 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-451 | |
Metrics |
ssvc
|
Thu, 25 Sep 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wso2
Wso2 api Manager Wso2 identity Server Wso2 identity Server As Key Manager |
|
Vendors & Products |
Wso2
Wso2 api Manager Wso2 identity Server Wso2 identity Server As Key Manager |
Tue, 23 Sep 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A content spoofing vulnerability exists in multiple WSO2 products due to improper error message handling. Under certain conditions, error messages are passed through URL parameters without validation, allowing malicious actors to inject arbitrary content into the UI. By exploiting this vulnerability, attackers can manipulate browser-displayed error messages, enabling social engineering attacks through deceptive or misleading content. | |
Title | Content Spoofing in Multiple WSO2 Products via Error Message Injection | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2025-09-25T16:14:02.884Z
Reserved: 2024-07-01T12:48:38.456Z
Link: CVE-2024-6429

Updated: 2025-09-25T16:13:58.398Z

Status : Analyzed
Published: 2025-09-23T17:15:30.643
Modified: 2025-10-06T13:39:38.010
Link: CVE-2024-6429

No data.

Updated: 2025-09-25T08:22:03Z