Description
A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution. By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.
Product status
Any version before 4.2.0
4.2.0 (custom) before 4.2.0.179
4.3.0 (custom) before 4.3.0.91
4.4.0 (custom) before 4.4.0.55
4.5.0 (custom) before 4.5.0.38
4.6.0 (custom) before 4.6.0.3
Any version before 4.5.0
4.5.0 (custom) before 4.5.0.39
4.6.0 (custom) before 4.6.0.3
Any version before 4.5.0
4.5.0 (custom) before 4.5.0.37
4.6.0 (custom) before 4.6.0.3
Any version before 4.5.0
4.5.0 (custom) before 4.5.0.37
4.6.0 (custom) before 4.6.0.3
9.28.116 (custom) before 9.28.116.391
9.29.120 (custom) before 9.29.120.210
9.30.67 (custom) before 9.30.67.133
9.31.86 (custom) before 9.31.86.100
9.32.147 (custom) before 9.32.147.2
x (custom)
Credits
Thilan Dissanayaka
References
security.docs.wso2.com/...ty-advisories/2026/WSO2-2025-4849/