Home

Description

An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user-supplied filenames in the BPEL uploader SOAP service endpoint. A malicious actor with administrative privileges can upload arbitrary files to a user-controlled location on the server. By leveraging this vulnerability, an attacker can upload a specially crafted payload and achieve remote code execution (RCE), potentially compromising the server and its data.

PUBLISHED Reserved 2025-03-03 | Published 2025-09-26 | Updated 2025-09-29 | Assigner WSO2




MEDIUM: 6.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L

Problem types

CWE-434 Unrestricted Upload of File with Dangerous Type

Product status

Default status
unaffected

6.6.0 before 6.6.0.215
affected

Default status
unaffected

Any version before 5.10.0
unknown

5.10.0 before 5.10.0.347
affected

5.11.0 before 5.11.0.396
affected

6.0.0 before 6.0.0.232
affected

6.1.0 before 6.1.0.224
affected

Default status
unaffected

2.0.0 before 2.0.0.391
affected

Default status
unaffected

Any version before 5.10.0
unknown

5.10.0 before 5.10.0.340
affected

Credits

Luk Luk reporter

References

security.docs.wso2.com/...ty-advisories/2025/WSO2-2025-3992/ vendor-advisory

cve.org (CVE-2025-1862)

nvd.nist.gov (CVE-2025-1862)

Download JSON