For Kiuwan installations with SSO (single sign-on) enabled, an unauthenticated reflected cross-site scripting attack can be performed on the login page "login.html". This is possible due to the request parameter "message" values being directly included in a JavaScript block in the response. This is especially critical in business environments using AD SSO authentication, e.g. via ADFS, where attackers could potentially steal AD passwords. This issue affects Kiuwan SAST: <master.1808.p685.q13371
History

Tue, 04 Nov 2025 18:30:00 +0000

Type Values Removed Values Added
References

Tue, 04 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Kiuwan
Kiuwan sast
CPEs cpe:2.3:a:kiuwan:sast:master.1808.p685.q13371:*:*:*:*:*:*:*
Vendors & Products Kiuwan
Kiuwan sast
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2025-11-04T17:13:02.645Z

Reserved: 2023-11-22T11:08:37.654Z

Link: CVE-2023-49111

cve-icon Vulnrichment

Updated: 2025-11-04T17:13:02.645Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-20T13:15:49.380

Modified: 2025-11-04T18:15:43.390

Link: CVE-2023-49111

cve-icon Redhat

No data.