Home

Description

An arbitrary file upload vulnerability exists in multiple WSO2 products due to insufficient validation of uploaded content and destination in SOAP admin services. A malicious actor with administrative privileges can upload a specially crafted file to a user-controlled location within the deployment. Successful exploitation may lead to remote code execution (RCE) on the server, depending on how the uploaded file is processed. By default, this vulnerability is only exploitable by users with administrative access to the affected SOAP services.

PUBLISHED Reserved 2025-09-24 | Published 2025-11-05 | Updated 2025-11-05 | Assigner WSO2




HIGH: 8.4CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-434 Unrestricted Upload of File with Dangerous Type

Product status

Default status
unaffected

Any version before 3.1.0
unknown

3.1.0 (custom) before 3.1.0.345
affected

3.2.0 (custom) before 3.2.0.448
affected

3.2.1 (custom) before 3.2.1.66
affected

4.0.0 (custom) before 4.0.0.367
affected

4.1.0 (custom) before 4.1.0.230
affected

4.2.0 (custom) before 4.2.0.169
affected

4.3.0 (custom) before 4.3.0.81
affected

4.4.0 (custom) before 4.4.0.45
affected

4.5.0 (custom) before 4.5.0.28
affected

Default status
unaffected

Any version before 2.0.0
unknown

2.0.0 (custom) before 2.0.0.414
affected

Default status
unaffected

Any version before 2.0.0
unknown

2.0.0 (custom) before 2.0.0.394
affected

Default status
unaffected

4.5.0 (custom) before 4.5.0.29
affected

Default status
unaffected

4.5.0 (custom) before 4.5.0.27
affected

Default status
unaffected

4.5.0 (custom) before 4.5.0.27
affected

Default status
unaffected

Any version before 4.0.0
unknown

4.0.0 (custom) before 4.0.0.145
affected

4.1.0 (custom) before 4.1.0.147
affected

4.2.0 (custom) before 4.2.0.141
affected

Default status
unaffected

Any version before 5.10.0
unknown

5.10.0 (custom) before 5.10.0.375
affected

5.11.0 (custom) before 5.11.0.419
affected

6.0.0 (custom) before 6.0.0.248
affected

6.1.0 (custom) before 6.1.0.248
affected

7.0.0 (custom) before 7.0.0.124
affected

7.1.0 (custom) before 7.1.0.31
affected

Default status
unaffected

Any version before 5.10.0
unknown

5.10.0 (custom) before 5.10.0.365
affected

Default status
unaffected

Any version before 6.6.0
unknown

6.6.0 (custom) before 6.6.0.224
affected

Default status
unknown

0.14.13 (custom) before 0.14.13.8
affected

0.14.16 (custom) before 0.14.16.1
affected

Default status
unknown

2.2.14 (custom) before 2.2.14.7
affected

2.2.17 (custom) before 2.2.17.2
affected

2.3.1 (custom) before 2.3.1.3
affected

2.3.19 (custom)
unaffected

Default status
unknown

4.7.30 (custom) before 4.7.30.47
affected

4.7.61 (custom) before 4.7.61.62
affected

4.7.99 (custom) before 4.7.99.304
affected

4.7.131 (custom) before 4.7.131.22
affected

4.7.175 (custom) before 4.7.175.30
affected

4.7.188 (custom) before 4.7.188.12
affected

4.7.204 (custom) before 4.7.204.13
affected

4.7.221 (custom) before 4.7.221.7
affected

4.7.245 (custom) before 4.7.245.7
affected

4.7.262 (custom)
unaffected

Default status
unknown

4.9.15 (custom) before 4.9.15.2
affected

4.10.1 (custom) before 4.10.1.1
affected

4.10.9 (custom) before 4.10.9.2
affected

4.11.1 (custom) before 4.11.1.3
affected

4.11.3 (custom) before 4.11.3.3
affected

4.11.7 (custom) before 4.11.7.5
affected

4.11.14 (custom) before 4.11.14.2
affected

4.11.17 (custom) before 4.11.17.3
affected

4.11.18 (custom) before 4.11.18.1
affected

4.11.24 (custom)
unaffected

Default status
unknown

4.10.1 (custom) before 4.10.1.1
affected

4.10.9 (custom) before 4.10.9.2
affected

4.11.1 (custom) before 4.11.1.3
affected

4.11.3 (custom) before 4.11.3.3
affected

4.11.7 (custom) before 4.11.7.5
affected

4.11.14 (custom) before 4.11.14.2
affected

4.11.17 (custom) before 4.11.17.3
affected

4.11.18 (custom) before 4.11.18.1
affected

4.11.24 (custom)
unaffected

Default status
unknown

1.2.11 (custom) before 1.2.11.wso2v17_5
affected

1.2.11-wso2v21 (custom)
unaffected

Default status
unknown

4.5.3 (custom) before 4.5.3.46
affected

4.6.0 (custom) before 4.6.0.2005
affected

4.6.1 (custom) before 4.6.1.153
affected

4.6.2 (custom) before 4.6.2.668
affected

4.6.3 (custom) before 4.6.3.37
affected

4.6.4 (custom) before 4.6.4.15
affected

4.7.1 (custom) before 4.7.1.72
affected

4.8.1 (custom) before 4.8.1.40
affected

4.9.0 (custom) before 4.9.0.103
affected

4.9.26 (custom) before 4.9.26.26
affected

4.9.27 (custom) before 4.9.27.11
affected

4.9.28 (custom) before 4.9.28.12
affected

4.10.9 (custom) before 4.10.9.71
affected

4.10.42 (custom) before 4.10.42.14
affected

4.9.30 (custom)
unaffected

4.10.95 (custom)
unaffected

Default status
unknown

4.5.3 (custom) before 4.5.3.46
affected

4.6.0 (custom) before 4.6.0.2005
affected

4.6.1 (custom) before 4.6.1.153
affected

4.6.2 (custom) before 4.6.2.668
affected

4.6.3 (custom) before 4.6.3.37
affected

4.6.4 (custom) before 4.6.4.15
affected

4.7.1 (custom) before 4.7.1.72
affected

4.8.1 (custom) before 4.8.1.40
affected

4.9.0 (custom) before 4.9.0.103
affected

4.9.26 (custom) before 4.9.26.26
affected

4.9.27 (custom) before 4.9.27.11
affected

4.9.28 (custom) before 4.9.28.12
affected

4.10.9 (custom) before 4.10.9.71
affected

4.10.42 (custom) before 4.10.42.14
affected

4.9.30 (custom)
unaffected

4.10.95 (custom)
unaffected

Credits

crnković reporter

References

security.docs.wso2.com/...ty-advisories/2025/WSO2-2025-4603/ vendor-advisory

cve.org (CVE-2025-10907)

nvd.nist.gov (CVE-2025-10907)

Download JSON