Vulnerability Description
The authentication endpoint accepts user-supplied input without enforcing expected validation constraints, leading to a lack of proper output encoding. This allows for the injection of malicious JavaScript payloads, enabling reflected cross-site scripting. An attacker can leverage this vulnerability to redirect the user's browser to a malicious website, modify the user interface of the web page, retrieve information from the browser, or cause other harmful actions. However, due to the protection of session-related cookies with the httpOnly flag, session hijacking is not possible.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wso2 | Identity Server | >= 7.1.0, < 7.1.0.28 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2025-10503?
CVE-2025-10503 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The authentication endpoint accepts user-supplied input without enforcing expected validation constraints, leading to a lack of proper output encoding. This allows for the injection of malicious JavaS...
How severe is CVE-2025-10503?
CVE-2025-10503 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-10503?
Check the references section above for vendor advisories and patch information. Affected products include: Wso2 Identity Server.