Описание
WSO2 carbon-apimgt affected by an authenticated stored cross-site scripting (XSS) vulnerability
An authenticated stored Cross-Site Scripting (XSS) vulnerability exists in WSO2 API Manager components (carbon-apimgt) due to insufficient validation of user-supplied input during API document upload in the Publisher portal.
A user with publisher privileges can upload a crafted API document whose contents are later rendered in the UI for other users, leading to attacker-controlled script execution. Likely outcomes include redirection to malicious sites, unauthorized UI modifications, or exfiltration of data accessible to the browser; session hijacking is mitigated by the use of HttpOnly session cookies.
To remediate, update to version 9.31.117 or above.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-4760
- https://github.com/wso2/carbon-apimgt/pull/13099
- https://github.com/wso2/carbon-apimgt/commit/1b3496c072ec68aaaf726996e2caa76f07c1adca
- https://mvnrepository.com/artifact/org.wso2.carbon.apimgt/org.wso2.carbon.apimgt.api/9.31.117
- https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4104
Пакеты
org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.api
< 9.31.117
9.31.117
org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.rest.api.publisher.v1
< 9.31.117
9.31.117
Связанные уязвимости
An authenticated stored cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to improper validation of user-supplied input during API document upload in the Publisher portal. A user with publisher privileges can upload a crafted API document containing malicious JavaScript, which is later rendered in the browser when accessed by other users. A successful attack could result in redirection to malicious websites, unauthorized UI modifications, or exfiltration of browser-accessible data. However, session-related sensitive cookies are protected by the httpOnly flag, preventing session hijacking.