The authentication endpoint accepts user-supplied input without enforcing expected validation constraints, leading to a lack of proper output encoding. This allows for the injection of malicious JavaScript payloads, enabling reflected cross-site scripting. An attacker can leverage this vulnerability to redirect the user's browser to a malicious website, modify the user interface of the web page, retrieve information from the browser, or cause other harmful actions. However, due to the protection of session-related cookies with the httpOnly flag, session hijacking is not possible.
History

Wed, 29 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Description The authentication endpoint accepts user-supplied input without enforcing expected validation constraints, leading to a lack of proper output encoding. This allows for the injection of malicious JavaScript payloads, enabling reflected cross-site scripting. An attacker can leverage this vulnerability to redirect the user's browser to a malicious website, modify the user interface of the web page, retrieve information from the browser, or cause other harmful actions. However, due to the protection of session-related cookies with the httpOnly flag, session hijacking is not possible.
Title Reflected Cross-Site Scripting via Authentication Endpoint in WSO2 Identity Server
First Time appeared Wso2
Wso2 wso2 Identity Server
Weaknesses CWE-79
CPEs cpe:2.3:a:wso2:wso2_identity_server:*:*:*:*:*:*:*:*
Vendors & Products Wso2
Wso2 wso2 Identity Server
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: WSO2

Published: 2026-04-29T08:08:37.335Z

Updated: 2026-04-29T12:28:52.278Z

Reserved: 2025-09-16T04:58:57.289Z

Link: CVE-2025-10503

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-29T09:16:23.663

Modified: 2026-04-29T09:16:23.663

Link: CVE-2025-10503

cve-icon Redhat

No data.