
CVE-2024-3511 – Incorrect Authorization in Multiple WSO2 Products Allows Unauthorized Access to Registry Versioned Files
https://notcve.org/view.php?id=CVE-2024-3511
23 Jun 2025 — An incorrect authorization vulnerability exists in multiple WSO2 products that allows unauthorized access to versioned files stored in the registry. Due to flawed authorization logic, a malicious actor with access to the management console can exploit a specific bypass method to retrieve versioned files without proper authorization. Successful exploitation of this vulnerability could lead to unauthorized disclosure of configuration or resource files that may be stored as registry versions, potentially aidin... • https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-2702 • CWE-863: Incorrect Authorization •

CVE-2024-8008 – Reflected Cross-Site Scripting (XSS) in Multiple WSO2 Products via JDBC User Store Connection Validation
https://notcve.org/view.php?id=CVE-2024-8008
02 Jun 2025 — A reflected cross-site scripting (XSS) vulnerability exists in multiple [Vendor Name] products due to insufficient output encoding in error messages generated by the JDBC user store connection validation request. A malicious actor can inject a specially crafted payload into the request, causing the browser to execute arbitrary JavaScript in the context of the vulnerable page. This vulnerability may allow UI manipulation, redirection to malicious websites, or data exfiltration from the browser. However, sinc... • https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3178 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-3509 – Stored Cross-Site Scripting (XSS) in Management Console of Multiple WSO2 Products via Rich Text Editor
https://notcve.org/view.php?id=CVE-2024-3509
02 Jun 2025 — A stored cross-site scripting (XSS) vulnerability exists in the Management Console of multiple WSO2 products due to insufficient input validation in the Rich Text Editor within the registry section. To exploit this vulnerability, a malicious actor must have a valid user account with administrative access to the Management Console. If successful, the actor could inject persistent JavaScript payloads, enabling the theft of user data or execution of unauthorized actions on behalf of other users. While this iss... • https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-2701 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-7097 – Incorrect Authorization in Multiple WSO2 Products via SOAP Admin Service Allowing Unauthorized User Signup
https://notcve.org/view.php?id=CVE-2024-7097
30 May 2025 — An incorrect authorization vulnerability exists in multiple WSO2 products due to a flaw in the SOAP admin service, which allows user account creation regardless of the self-registration configuration settings. This vulnerability enables malicious actors to create new user accounts without proper authorization. Exploitation of this flaw could allow an attacker to create multiple low-privileged user accounts, gaining unauthorized access to the system. Additionally, continuous exploitation could lead to system... • https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3574 • CWE-863: Incorrect Authorization •

CVE-2024-7096 – Privilege Escalation in Multiple WSO2 Products via SOAP Admin Service Due to Business Logic Flaw
https://notcve.org/view.php?id=CVE-2024-7096
30 May 2025 — A privilege escalation vulnerability exists in multiple [Vendor Name] products due to a business logic flaw in SOAP admin services. A malicious actor can create a new user with elevated permissions only when all of the following conditions are met: * SOAP admin services are accessible to the attacker. * The deployment includes an internally used attribute that is not part of the default WSO2 product configuration. * At least one custom role exists with non-default permissions. * The attacker has knowledge o... • https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3573 • CWE-863: Incorrect Authorization •

CVE-2024-5962 – Reflected Cross-Site Scripting (XSS) in Authentication Endpoint of Multiple WSO2 Products Due to Missing Output Encoding
https://notcve.org/view.php?id=CVE-2024-5962
22 May 2025 — A reflected cross-site scripting (XSS) vulnerability exists in the authentication endpoint of multiple WSO2 products due to missing output encoding of user-supplied input. A malicious actor can exploit this vulnerability to inject arbitrary JavaScript into the authentication flow, potentially leading to UI modifications, redirections to malicious websites, or data exfiltration from the browser. While this issue could allow an attacker to manipulate the user’s browser, session-related sensitive cookies remai... • https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3443 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-5848 – Reflected Cross-Site Scripting (XSS) in Multiple WSO2 Products Due to Improper Input Validation
https://notcve.org/view.php?id=CVE-2024-5848
27 Feb 2025 — A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to improper input validation. User-supplied data is directly included in server responses from vulnerable service endpoints without proper sanitization or encoding, allowing an attacker to inject malicious JavaScript. Successful exploitation could lead to UI manipulation, redirection to malicious websites, or data exfiltration from the browser. While session-related sensitive cookies are protected with the httpOnly fla... • https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3450 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-2321 – Incorrect Authorization in Multiple WSO2 Products Allows API Access via Refresh Token
https://notcve.org/view.php?id=CVE-2024-2321
27 Feb 2025 — An incorrect authorization vulnerability exists in multiple WSO2 products, allowing protected APIs to be accessed directly using a refresh token instead of the expected access token. Due to improper authorization checks and token mapping, session cookies are not required for API access, potentially enabling unauthorized operations. Exploitation requires an attacker to obtain a valid refresh token of an admin user. Since refresh tokens generally have a longer expiration time, this could lead to prolonged una... • https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3213 • CWE-863: Incorrect Authorization •

CVE-2024-7074 – Authenticated Arbitrary File Upload in Multiple WSO2 Products via SOAP Admin Service Leading to Remote Code Execution
https://notcve.org/view.php?id=CVE-2024-7074
30 Dec 2024 — An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server. By leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially ma... • https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3566 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2024-6914 – Incorrect Authorization in Multiple WSO2 Products via Account Recovery SOAP Admin Service Leading to Account Takeover
https://notcve.org/view.php?id=CVE-2024-6914
30 Dec 2024 — An incorrect authorization vulnerability exists in multiple WSO2 products due to a business logic flaw in the account recovery-related SOAP admin service. A malicious actor can exploit this vulnerability to reset the password of any user account, leading to a complete account takeover, including accounts with elevated privileges. This vulnerability is exploitable only through the account recovery SOAP admin services exposed via the "/services" context path in affected products. The impact may be reduced if ... • https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3561 • CWE-863: Incorrect Authorization •