CVE-2024-6429: WSO2 Identity Server Apps allows content spoofing in logs
(updated )
A content spoofing issue exists in WSO2 Identity Server Apps, specifically in the Authentication Portal, due to improper handling of authentication error messages. When an authentication failure occurs, the portal previously accepted an authFailureMsg
value supplied via URL and rendered it in the UI without validating it against the resource bundle. An attacker can craft a link that causes the portal to display attacker-controlled text in the error banner, enabling UI misrepresentation and social-engineering.
The fix validates the message key against the resource bundle and encodes input before rendering. Upgrade to org.wso2.identity.apps:authentication-portal
2.4.4 or later to remediate.
References
- github.com/advisories/GHSA-r6f3-55wj-g9p3
- github.com/wso2/identity-apps
- github.com/wso2/identity-apps/commit/75babf6b60f940f86bada7020e5d464ca95e47f2
- github.com/wso2/identity-apps/pull/6488
- github.com/wso2/identity-apps/releases/tag/@wso2is/identity-apps-core@2.4.4
- nvd.nist.gov/vuln/detail/CVE-2024-6429
- security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3490
Code Behaviors & Features
Detect and mitigate CVE-2024-6429 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →