{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-6429","assignerOrgId":"ed10eef1-636d-4fbe-9993-6890dfa878f8","state":"PUBLISHED","assignerShortName":"WSO2","dateReserved":"2024-07-01T12:48:38.456Z","datePublished":"2025-09-23T16:37:58.340Z","dateUpdated":"2025-09-25T16:14:02.884Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"WSO2 Identity Server as Key Manager","vendor":"WSO2","versions":[{"lessThan":"5.10.0.338","status":"affected","version":"5.10.0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"WSO2 API Manager","vendor":"WSO2","versions":[{"lessThan":"3.2.0","status":"unknown","version":"0","versionType":"custom"},{"lessThan":"3.2.0.409","status":"affected","version":"3.2.0","versionType":"custom"},{"lessThan":"3.2.1.33","status":"affected","version":"3.2.1","versionType":"custom"},{"lessThan":"4.0.0.327","status":"affected","version":"4.0.0","versionType":"custom"},{"lessThan":"4.1.0.188","status":"affected","version":"4.1.0","versionType":"custom"},{"lessThan":"4.2.0.128","status":"affected","version":"4.2.0","versionType":"custom"},{"lessThan":"4.3.0.38","status":"affected","version":"4.3.0","versionType":"custom"},{"lessThan":"4.4.0.4","status":"affected","version":"4.4.0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"WSO2 Identity Server","vendor":"WSO2","versions":[{"lessThan":"5.10.0","status":"unknown","version":"0","versionType":"custom"},{"lessThan":"5.10.0.314","status":"affected","version":"5.10.0","versionType":"custom"},{"lessThan":"5.11.0.359","status":"affected","version":"5.11.0","versionType":"custom"},{"lessThan":"6.0.0.203","status":"affected","version":"6.0.0","versionType":"custom"},{"lessThan":"6.1.0.176","status":"affected","version":"6.1.0","versionType":"custom"},{"lessThan":"7.0.0.48","status":"affected","version":"7.0.0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A content spoofing vulnerability exists in multiple WSO2 products due to improper error message handling. Under certain conditions, error messages are passed through URL parameters without validation, allowing malicious actors to inject arbitrary content into the UI.<br><br>By exploiting this vulnerability, attackers can manipulate browser-displayed error messages, enabling social engineering attacks through deceptive or misleading content.<br>"}],"value":"A content spoofing vulnerability exists in multiple WSO2 products due to improper error message handling. Under certain conditions, error messages are passed through URL parameters without validation, allowing malicious actors to inject arbitrary content into the UI.\n\nBy exploiting this vulnerability, attackers can manipulate browser-displayed error messages, enabling social engineering attacks through deceptive or misleading content."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"ed10eef1-636d-4fbe-9993-6890dfa878f8","shortName":"WSO2","dateUpdated":"2025-09-23T16:37:58.340Z"},"references":[{"tags":["vendor-advisory"],"url":"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: transparent;\">Follow the instructions given on </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/#solution\"><span style=\"background-color: transparent;\">https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/#solution</span></a> <br>"}],"value":"Follow the instructions given on  https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490/#solution"}],"source":{"advisory":"WSO2-2024-3490","discovery":"INTERNAL"},"title":"Content Spoofing in Multiple WSO2 Products via Error Message Injection","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-451","lang":"en","description":"CWE-451 User Interface (UI) Misrepresentation of Critical Information"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-23T18:31:05.120276Z","id":"CVE-2024-6429","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-25T16:14:02.884Z"}}]}}