For Kiuwan installations with SSO (single sign-on) enabled, an
unauthenticated reflected cross-site scripting attack can be performed
on the login page "login.html". This is possible due to the request parameter "message" values
being directly included in a JavaScript block in the response. This is
especially critical in business environments using AD SSO
authentication, e.g. via ADFS, where attackers could potentially steal
AD passwords.
This issue affects Kiuwan SAST: <master.1808.p685.q13371
Metrics
Affected Vendors & Products
References
History
Tue, 04 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 04 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kiuwan
Kiuwan sast |
|
| CPEs | cpe:2.3:a:kiuwan:sast:master.1808.p685.q13371:*:*:*:*:*:*:* | |
| Vendors & Products |
Kiuwan
Kiuwan sast |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-11-04T17:13:02.645Z
Reserved: 2023-11-22T11:08:37.654Z
Link: CVE-2023-49111
Updated: 2025-11-04T17:13:02.645Z
Status : Awaiting Analysis
Published: 2024-06-20T13:15:49.380
Modified: 2025-11-04T18:15:43.390
Link: CVE-2023-49111
No data.