Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

N/A

Source -

N/A

CNA CVEs -

0

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

0
Related CVEsRelated VendorsRelated AssignersReports
0Vulnerabilities found

CVE-2024-3511
Assigner-WSO2 LLC
ShareView Details
Assigner-WSO2 LLC
CVSS Score-4.3||MEDIUM
EPSS-0.04% / 8.62%
||
7 Day CHG~0.00%
Published-23 Jun, 2025 | 08:47
Updated-23 Jun, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Authorization in Multiple WSO2 Products Allows Unauthorized Access to Registry Versioned Files

An incorrect authorization vulnerability exists in multiple WSO2 products that allows unauthorized access to versioned files stored in the registry. Due to flawed authorization logic, a malicious actor with access to the management console can exploit a specific bypass method to retrieve versioned files without proper authorization. Successful exploitation of this vulnerability could lead to unauthorized disclosure of configuration or resource files that may be stored as registry versions, potentially aiding further attacks or system reconnaissance.

Action-Not Available
Vendor-WSO2 LLC
Product-WSO2 Enterprise IntegratorWSO2 Identity Server as Key ManagerWSO2 Open Banking AMWSO2 Open Banking IAMWSO2 Carbon User Manager KernelWSO2 API ManagerWSO2 Identity Server
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-1440
Assigner-WSO2 LLC
ShareView Details
Assigner-WSO2 LLC
CVSS Score-5.4||MEDIUM
EPSS-0.06% / 17.54%
||
7 Day CHG~0.00%
Published-02 Jun, 2025 | 16:51
Updated-02 Jun, 2025 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Open Redirection in Multiple WSO2 Products via Multi-Option Authentication Endpoint

An open redirection vulnerability exists in multiple WSO2 products due to improper validation of the multi-option URL in the authentication endpoint when multi-option authentication is enabled. A malicious actor can craft a valid link that redirects users to an attacker-controlled site. By exploiting this vulnerability, an attacker may trick users into visiting a malicious page, enabling phishing attacks to harvest sensitive information or perform other harmful actions.

Action-Not Available
Vendor-WSO2 LLC
Product-WSO2 Identity Server as Key ManagerWSO2 Open Banking AMWSO2 API ManagerWSO2 Identity ServerWSO2 Carbon Identity Application Authentication Endpoint(Utils)WSO2 Open Banking IAM
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2024-8008
Assigner-WSO2 LLC
ShareView Details
Assigner-WSO2 LLC
CVSS Score-5.2||MEDIUM
EPSS-0.03% / 5.27%
||
7 Day CHG~0.00%
Published-02 Jun, 2025 | 16:48
Updated-06 Jun, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected Cross-Site Scripting (XSS) in Multiple WSO2 Products via JDBC User Store Connection Validation

A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to insufficient output encoding in error messages generated by the JDBC user store connection validation request. A malicious actor can inject a specially crafted payload into the request, causing the browser to execute arbitrary JavaScript in the context of the vulnerable page. This vulnerability may allow UI manipulation, redirection to malicious websites, or data exfiltration from the browser. However, since all session-related sensitive cookies are protected with the httpOnly flag, session hijacking is not possible.

Action-Not Available
Vendor-WSO2 LLC
Product-WSO2 Carbon Identity User Store Configuration UIWSO2 Identity Server as Key ManagerWSO2 Open Banking AMWSO2 Identity ServerWSO2 API ManagerWSO2 Enterprise IntegratorWSO2 Open Banking IAM
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-3509
Assigner-WSO2 LLC
ShareView Details
Assigner-WSO2 LLC
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 6.73%
||
7 Day CHG~0.00%
Published-02 Jun, 2025 | 16:44
Updated-02 Jun, 2025 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stored Cross-Site Scripting (XSS) in Management Console of Multiple WSO2 Products via Rich Text Editor

A stored cross-site scripting (XSS) vulnerability exists in the Management Console of multiple WSO2 products due to insufficient input validation in the Rich Text Editor within the registry section. To exploit this vulnerability, a malicious actor must have a valid user account with administrative access to the Management Console. If successful, the actor could inject persistent JavaScript payloads, enabling the theft of user data or execution of unauthorized actions on behalf of other users. While this issue enables persistent client-side script execution, session-related cookies remain protected with the httpOnly flag, preventing session hijacking.

Action-Not Available
Vendor-WSO2 LLC
Product-WSO2 Identity Server as Key ManagerWSO2 Open Banking AMWSO2 API ManagerWSO2 Identity ServerWSO2 Carbon Registry Resources UIWSO2 Open Banking IAMWSO2 Enterprise Integrator
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-7074
Assigner-WSO2 LLC
ShareView Details
Assigner-WSO2 LLC
CVSS Score-6.8||MEDIUM
EPSS-0.06% / 17.37%
||
7 Day CHG~0.00%
Published-02 Jun, 2025 | 16:42
Updated-02 Jun, 2025 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authenticated Arbitrary File Upload in Multiple WSO2 Products via SOAP Admin Service Leading to Remote Code Execution

An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server. By leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users.

Action-Not Available
Vendor-WSO2 LLC
Product-WSO2 Enterprise Mobility ManagerWSO2 Carbon Synapse Artifact Uploader BEWSO2 Open Banking AMWSO2 API ManagerWSO2 Micro IntegratorWSO2 Enterprise Service BusWSO2 Enterprise Integrator
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2024-7097
Assigner-WSO2 LLC
ShareView Details
Assigner-WSO2 LLC
CVSS Score-4.3||MEDIUM
EPSS-0.34% / 55.74%
||
7 Day CHG+0.03%
Published-30 May, 2025 | 15:04
Updated-30 May, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Authorization in Multiple WSO2 Products via SOAP Admin Service Allowing Unauthorized User Signup

An incorrect authorization vulnerability exists in multiple WSO2 products due to a flaw in the SOAP admin service, which allows user account creation regardless of the self-registration configuration settings. This vulnerability enables malicious actors to create new user accounts without proper authorization. Exploitation of this flaw could allow an attacker to create multiple low-privileged user accounts, gaining unauthorized access to the system. Additionally, continuous exploitation could lead to system resource exhaustion through mass user creation.

Action-Not Available
Vendor-WSO2 LLC
Product-WSO2 Identity ServerWSO2 Enterprise Mobility ManagerWSO2 Open Banking KMWSO2 Identity Server as Key ManagerWSO2 Open Banking AMWSO2 API ManagerWSO2 Open Banking IAM
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-7096
Assigner-WSO2 LLC
ShareView Details
Assigner-WSO2 LLC
CVSS Score-4.2||MEDIUM
EPSS-0.02% / 4.21%
||
7 Day CHG~0.00%
Published-30 May, 2025 | 14:54
Updated-30 May, 2025 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege Escalation in Multiple WSO2 Products via SOAP Admin Service Due to Business Logic Flaw

A privilege escalation vulnerability exists in multiple [Vendor Name] products due to a business logic flaw in SOAP admin services. A malicious actor can create a new user with elevated permissions only when all of the following conditions are met: * SOAP admin services are accessible to the attacker. * The deployment includes an internally used attribute that is not part of the default WSO2 product configuration. * At least one custom role exists with non-default permissions. * The attacker has knowledge of the custom role and the internal attribute used in the deployment. Exploiting this vulnerability allows malicious actors to assign higher privileges to self-registered users, bypassing intended access control mechanisms.

Action-Not Available
Vendor-WSO2 LLC
Product-WSO2 Identity ServerWSO2 Enterprise Mobility ManagerWSO2 Open Banking KMWSO2 Identity Server as Key ManagerWSO2 Open Banking AMWSO2 API ManagerWSO2 Open Banking IAM
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-6914
Assigner-WSO2 LLC
ShareView Details
Assigner-WSO2 LLC
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 20.03%
||
7 Day CHG~0.00%
Published-22 May, 2025 | 18:26
Updated-23 May, 2025 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Authorization in Multiple WSO2 Products via Account Recovery SOAP Admin Service Leading to Account Takeover

An incorrect authorization vulnerability exists in multiple WSO2 products due to a business logic flaw in the account recovery-related SOAP admin service. A malicious actor can exploit this vulnerability to reset the password of any user account, leading to a complete account takeover, including accounts with elevated privileges. This vulnerability is exploitable only through the account recovery SOAP admin services exposed via the "/services" context path in affected products. The impact may be reduced if access to these endpoints has been restricted based on the "Security Guidelines for Production Deployment" by disabling exposure to untrusted networks.

Action-Not Available
Vendor-WSO2 LLC
Product-WSO2 IoTWSO2 Identity Server as Key ManagerWSO2 Identity ServerWSO2 Open banking KMWSO2 Open Banking AMWSO2 API ManagerWSO2 Carbon Identity ManagementWSO2 Governance RegistryWSO2 Open Banking IAM
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-5848
Assigner-WSO2 LLC
ShareView Details
Assigner-WSO2 LLC
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 7.66%
||
7 Day CHG~0.00%
Published-27 Feb, 2025 | 07:08
Updated-27 Feb, 2025 | 14:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected Cross-Site Scripting (XSS) in Multiple WSO2 Products Due to Improper Input Validation

A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to improper input validation. User-supplied data is directly included in server responses from vulnerable service endpoints without proper sanitization or encoding, allowing an attacker to inject malicious JavaScript. Successful exploitation could lead to UI manipulation, redirection to malicious websites, or data exfiltration from the browser. While session-related sensitive cookies are protected with the httpOnly flag, mitigating session hijacking risks, the impact may vary depending on gateway-level service restrictions.

Action-Not Available
Vendor-WSO2 LLC
Product-WSO2 Open Banking AMWSO2 API Manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')