CVE-2021-36760

In accountrecoveryendpoint/recoverpassword.do in WSO2 Identity Server 5.7.0, it is possible to perform a DOM-Based XSS attack affecting the callback parameter modifying the URL that precedes the callback parameter. Once the username or password reset procedure is completed, the JavaScript code will be executed. (recoverpassword.do also has an open redirect issue for a similar reason.)
Cross-site Scripting
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.1 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 78%
VendorProductVersion
wso2api_manager
3.0.0
wso2api_manager
3.1.0
wso2api_manager
3.2.0
wso2api_manager
4.0.0
wso2identity_server
5.7.0
wso2identity_server
5.8.0
wso2identity_server
5.9.0
wso2identity_server
5.10.0
wso2identity_server
5.11.0
wso2identity_server_as_key_manager
5.3.0
wso2identity_server_as_key_manager
5.5.0
wso2identity_server_as_key_manager
5.6.0
wso2identity_server_as_key_manager
5.7.0
wso2identity_server_as_key_manager
5.9.0
wso2identity_server_as_key_manager
5.10.0
wso2iot_server
3.3.1
𝑥
= Vulnerable software versions