Description
An authenticated remote code execution (RCE) vulnerability exists in multiple WSO2 products due to improper input validation in the event processor admin service. A user with administrative access to the SOAP admin services can exploit this flaw by deploying a Siddhi execution plan containing malicious Java code, resulting in arbitrary code execution on the server. Exploitation of this vulnerability requires a valid user account with administrative privileges, limiting the attack surface to authenticated but potentially malicious users.
Problem types
CWE-94 Improper Control of Generation of Code ('Code Injection')
Product status
Any version before 3.0.0
3.0.0 (custom) before 3.0.0.174
3.1.0 (custom) before 3.1.0.330
3.2.0 (custom) before 3.2.0.426
3.2.1 (custom) before 3.2.1.46
4.0.0 (custom) before 4.0.0.344
4.1.0 (custom) before 4.1.0.208
4.2.0 (custom) before 4.2.0.147
4.3.0 (custom) before 4.3.0.59
4.4.0 (custom) before 4.4.0.22
4.5.0 (custom) before 4.5.0.6
Any version before 2.0.0
2.0.0 (custom) before 2.0.0.379
4.5.0 (custom) before 4.5.0.6
4.5.0 (custom) before 4.5.0.6
3.2.6 (custom) before 3.2.6.8
3.2.7 (custom) before 3.2.7.6
3.2.8 (custom) before 3.2.8.3
3.2.10 (custom) before 3.2.10.1
3.2.13 (custom) before 3.2.13.2
3.2.14 (custom) before 3.2.14.1
3.2.15 (custom)
Credits
Noël MACCARY
References
security.docs.wso2.com/...ty-advisories/2025/WSO2-2025-4119/