Home

Description

The software fails to enforce role-based access controls for certain Gateway API invocations. Users with the 'Internal/Everyone' role can invoke these APIs, bypassing intended permission checks. This same vulnerability also affects Internal Service APIs, potentially exposing them in WSO2 APIM 3.x versions. A malicious actor with a valid user account on a vulnerable deployment can perform sensitive operations against the Gateway REST API regardless of their actual roles or privileges. This could lead to unintended behavior or misuse, particularly in production environments.

PUBLISHED Reserved 2025-07-30 | Published 2026-05-11 | Updated 2026-05-11 | Assigner WSO2




MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Problem types

CWE-281: Assigning Permissions Instead of Checking Them

Product status

Default status
unaffected

4.5.0 (custom) before 4.5.0.18
affected

Default status
unaffected

4.5.0 (custom) before 4.5.0.17
affected

Default status
unaffected

4.5.0 (custom) before 4.5.0.17
affected

Default status
unaffected

Any version before 3.2.0
unknown

3.2.0 (custom) before 3.2.0.435
affected

3.2.1 (custom) before 3.2.1.55
affected

4.0.0 (custom) before 4.0.0.355
affected

4.1.0 (custom) before 4.1.0.219
affected

4.2.0 (custom) before 4.2.0.157
affected

4.3.0 (custom) before 4.3.0.70
affected

4.4.0 (custom) before 4.4.0.33
affected

4.5.0 (custom) before 4.5.0.17
affected

Default status
unknown

6.7.206 (custom) before 6.7.206.563
affected

6.7.210 (custom) before 6.7.210.55
affected

9.0.174 (custom) before 9.0.174.513
affected

9.20.74 (custom) before 9.20.74.375
affected

9.28.116 (custom) before 9.28.116.352
affected

9.29.120 (custom) before 9.29.120.177
affected

9.30.67 (custom) before 9.30.67.100
affected

9.31.86 (custom) before 9.31.86.58
affected

9.32.75 (custom)
unaffected

Default status
unknown

6.7.206 (custom) before 6.7.206.563
affected

6.7.210 (custom) before 6.7.210.55
affected

9.0.174 (custom) before 9.0.174.513
affected

9.20.74 (custom) before 9.20.74.375
affected

9.28.116 (custom) before 9.28.116.352
affected

9.29.120 (custom) before 9.29.120.177
affected

9.30.67 (custom) before 9.30.67.100
affected

9.31.86 (custom) before 9.31.86.58
affected

9.32.75 (custom)
unaffected

References

security.docs.wso2.com/...ty-advisories/2026/WSO2-2025-4401/ vendor-advisory

cve.org (CVE-2025-8325)

nvd.nist.gov (CVE-2025-8325)

Download JSON