The authentication endpoint fails to encode user-supplied input before rendering it in the web page, allowing for script injection. An attacker can leverage this by injecting malicious scripts into the authentication endpoint. This can result in the user's browser being redirected to a malicious website, manipulation of the web page's user interface, or the retrieval of information from the browser. However, session hijacking is not possible due to the httpOnly flag protecting session-related cookies.
Use CWE-79, Wso2 vendor hub and Api Manager product page to widen CVE-2025-6024 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-9312, CVE-2025-13590 and CVE-2025-6670 for nearby disclosures in the same product family.