Home

Description

A missing authentication enforcement vulnerability exists in the mutual TLS (mTLS) implementation used by System REST APIs and SOAP services in multiple WSO2 products. Due to improper validation of client certificate–based authentication in certain default configurations, the affected components may permit unauthenticated requests even when mTLS is enabled. This condition occurs when relying on the default mTLS settings for System REST APIs or when the mTLS authenticator is enabled for SOAP services, causing these interfaces to accept requests without enforcing additional authentication. Successful exploitation allows a malicious actor with network access to the affected endpoints to gain administrative privileges and perform unauthorized operations. The vulnerability is exploitable only when the impacted mTLS flows are enabled and accessible in a given deployment. Other certificate-based authentication mechanisms such as Mutual TLS OAuth client authentication and X.509 login flows are not affected, and APIs served through the API Gateway of WSO2 API Manager remain unaffected.

PUBLISHED Reserved 2025-08-21 | Published 2025-11-18 | Updated 2025-11-18 | Assigner WSO2




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unaffected

Any version before 2.2.0
unknown

2.2.0 (custom) before 2.2.0.58
affected

2.5.0 (custom) before 2.5.0.84
affected

2.6.0 (custom) before 2.6.0.145
affected

3.0.0 (custom) before 3.0.0.175
affected

3.1.0 (custom) before 3.1.0.339
affected

3.2.0 (custom) before 3.2.0.439
affected

3.2.1 (custom) before 3.2.1.59
affected

4.0.0 (custom) before 4.0.0.359
affected

4.1.0 (custom) before 4.1.0.222
affected

4.2.0 (custom) before 4.2.0.161
affected

4.3.0 (custom) before 4.3.0.73
affected

4.4.0 (custom) before 4.4.0.37
affected

4.5.0 (custom) before 4.5.0.21
affected

Default status
unaffected

4.5.0 (custom) before 4.5.0.22
affected

Default status
unaffected

4.5.0 (custom) before 4.5.0.20
affected

Default status
unaffected

4.5.0 (custom) before 4.5.0.20
affected

Default status
unaffected

Any version before 5.3.0
unknown

5.3.0 (custom) before 5.3.0.39
affected

5.5.0 (custom) before 5.5.0.52
affected

5.6.0 (custom) before 5.6.0.74
affected

5.7.0 (custom) before 5.7.0.124
affected

5.9.0 (custom) before 5.9.0.175
affected

5.10.0 (custom) before 5.10.0.358
affected

Default status
unaffected

Any version before 5.2.0
unknown

5.2.0 (custom) before 5.2.0.33
affected

5.3.0 (custom) before 5.3.0.34
affected

5.4.0 (custom) before 5.4.0.33
affected

5.4.1 (custom) before 5.4.1.37
affected

5.5.0 (custom) before 5.5.0.51
affected

5.6.0 (custom) before 5.6.0.59
affected

5.7.0 (custom) before 5.7.0.125
affected

5.8.0 (custom) before 5.8.0.109
affected

5.9.0 (custom) before 5.9.0.168
affected

5.10.0 (custom) before 5.10.0.368
affected

5.11.0 (custom) before 5.11.0.411
affected

6.0.0 (custom) before 6.0.0.243
affected

6.1.0 (custom) before 6.1.0.241
affected

7.0.0 (custom) before 7.0.0.116
affected

7.1.0 (custom) before 7.1.0.23
affected

Default status
unaffected

Any version before 1.4.0
unknown

1.4.0 (custom) before 1.4.0.132
affected

1.5.0 (custom) before 1.5.0.122
affected

Default status
unaffected

Any version before 1.4.0
unknown

1.4.0 (custom) before 1.4.0.138
affected

1.5.0 (custom) before 1.5.0.139
affected

2.0.0 (custom) before 2.0.0.388
affected

Default status
unaffected

2.0.0 (custom) before 2.0.0.408
affected

Default status
unknown

1.1.1 (custom) before 1.1.1.2
affected

1.1.16 (custom) before 1.1.16.3
affected

1.1.18 (custom) before 1.1.18.4
affected

1.1.20 (custom) before 1.1.20.5
affected

1.1.26 (custom) before 1.1.26.7
affected

1.3.6 (custom) before 1.3.6.8
affected

1.4.0 (custom) before 1.4.0.18
affected

1.4.25 (custom) before 1.4.25.24
affected

1.4.52 (custom) before 1.4.52.4
affected

1.6.1 (custom) before 1.6.1.11
affected

1.7.1 (custom) before 1.7.1.4
affected

1.8.11 (custom) before 1.8.11.6
affected

1.8.41 (custom) before 1.8.41.2
affected

1.9.4 (custom) before 1.9.4.4
affected

1.9.18 (custom) before 1.9.18.2
affected

5.5.2 (custom)
unaffected

References

security.docs.wso2.com/...ty-advisories/2025/WSO2-2025-4494/ vendor-advisory

cve.org (CVE-2025-9312)

nvd.nist.gov (CVE-2025-9312)

Download JSON