A content spoofing vulnerability exists in multiple WSO2 products due to improper error message handling. Under certain conditions, error messages are passed through URL parameters without validation, allowing malicious actors to inject arbitrary content into the UI.

By exploiting this vulnerability, attackers can manipulate browser-displayed error messages, enabling social engineering attacks through deceptive or misleading content.
Fixes

Solution

Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/#solution


Workaround

No workaround given by the vendor.

History

Tue, 23 Sep 2025 17:00:00 +0000

Type Values Removed Values Added
Description A content spoofing vulnerability exists in multiple WSO2 products due to improper error message handling. Under certain conditions, error messages are passed through URL parameters without validation, allowing malicious actors to inject arbitrary content into the UI. By exploiting this vulnerability, attackers can manipulate browser-displayed error messages, enabling social engineering attacks through deceptive or misleading content.
Title Content Spoofing in Multiple WSO2 Products via Error Message Injection
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: WSO2

Published:

Updated: 2025-09-23T16:37:58.340Z

Reserved: 2024-07-01T12:48:38.456Z

Link: CVE-2024-6429

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-23T17:15:30.643

Modified: 2025-09-23T17:15:30.643

Link: CVE-2024-6429

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.