By leveraging this cross-site scripting vulnerability, a malicious actor can cause the browser to redirect to a malicious website, make changes to the UI of the web page, or retrieve information from the browser. However, session hijacking is not possible as all session-related sensitive cookies are protected by the httpOnly flag.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2026/WSO2-2024-3391/#solution
Workaround
No workaround given by the vendor.
Thu, 16 Apr 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wso2
Wso2 wso2 Api Manager |
|
| Vendors & Products |
Wso2
Wso2 wso2 Api Manager |
Thu, 16 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WSO2 API Manager developer portal accepts user-supplied input without enforcing expected validation constraints or proper output encoding. This deficiency allows a malicious actor to inject script content that is executed within the context of a user's browser. By leveraging this cross-site scripting vulnerability, a malicious actor can cause the browser to redirect to a malicious website, make changes to the UI of the web page, or retrieve information from the browser. However, session hijacking is not possible as all session-related sensitive cookies are protected by the httpOnly flag. | |
| Title | Cross-Site Scripting via Developer Portal in WSO2 API Manager Enables UI Modification and Information Retrieval | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2026-04-16T09:32:40.941Z
Reserved: 2024-05-14T12:13:06.529Z
Link: CVE-2024-4867
No data.
Status : Received
Published: 2026-04-16T10:16:13.893
Modified: 2026-04-16T10:16:13.893
Link: CVE-2024-4867
No data.
OpenCVE Enrichment
Updated: 2026-04-16T11:30:15Z