This vulnerability could allow attackers to redirect users to malicious websites, modify the user interface, or exfiltrate data from the browser. However, session-related sensitive cookies are protected using the httpOnly flag, which mitigates the risk of session hijacking.
Metrics
Affected Vendors & Products
Solution
Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3902/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3902/#solution
Workaround
No workaround given by the vendor.
Tue, 23 Sep 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 23 Sep 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A reflected cross-site scripting (XSS) vulnerability exists in the account registration flow of WSO2 Identity Server due to improper output encoding. A malicious actor can exploit this vulnerability by injecting a crafted payload that is reflected in the server response, enabling the execution of arbitrary JavaScript in the victim's browser. This vulnerability could allow attackers to redirect users to malicious websites, modify the user interface, or exfiltrate data from the browser. However, session-related sensitive cookies are protected using the httpOnly flag, which mitigates the risk of session hijacking. | |
Title | Reflected Cross-Site Scripting (XSS) in WSO2 Identity Server Account Registration Flow | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2025-09-23T18:37:43.867Z
Reserved: 2025-01-03T13:17:56.874Z
Link: CVE-2025-0209

Updated: 2025-09-23T18:30:51.377Z

Status : Received
Published: 2025-09-23T18:15:29.833
Modified: 2025-09-23T18:15:29.833
Link: CVE-2025-0209

No data.

No data.