First published: Fri Dec 15 2023(Updated: )
Multiple WSO2 products have been identified as vulnerable due to lack of server-side input validation in the Forum feature, API rating could be manipulated.
Credit: ed10eef1-636d-4fbe-9993-6890dfa878f8 ed10eef1-636d-4fbe-9993-6890dfa878f8
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.wso2.carbon.apimgt:forum | <=9.0.78 | |
WSO2 API Manager | =2.2.0 | |
WSO2 API Manager | =2.5.0 | |
WSO2 API Manager | =2.6.0 | |
Wso2 Iot Server | =3.3.1 | |
=2.2.0 | ||
=2.5.0 | ||
=2.6.0 | ||
=3.3.1 |
For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly. Community users may apply the relevant fixes to the product based on the public fix(s) advertised in https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1357/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.