WSO2 Identity Server Apps allows content spoofing in logs
        
  Moderate severity
        
          GitHub Reviewed
      
        Published
          Sep 23, 2025 
          to the GitHub Advisory Database
          •
          Updated Sep 27, 2025 
      
  
Package
Affected versions
< 2.4.4
  Patched versions
2.4.4
  Description
        Published by the National Vulnerability Database
      Sep 23, 2025 
    
  
        Published to the GitHub Advisory Database
      Sep 23, 2025 
    
  
        Reviewed
      Sep 23, 2025 
    
  
        Last updated
      Sep 27, 2025 
    
  
A content spoofing issue exists in WSO2 Identity Server Apps, specifically in the Authentication Portal, due to improper handling of authentication error messages. When an authentication failure occurs, the portal previously accepted an
authFailureMsgvalue supplied via URL and rendered it in the UI without validating it against the resource bundle. An attacker can craft a link that causes the portal to display attacker-controlled text in the error banner, enabling UI misrepresentation and social-engineering.The fix validates the message key against the resource bundle and encodes input before rendering. Upgrade to
org.wso2.identity.apps:authentication-portal2.4.4 or later to remediate.References