An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper input validation in the CarbonAppUploader admin service endpoint. An authenticated attacker with appropriate privileges can upload a malicious file to a user-controlled location on the server, potentially leading to remote code execution (RCE).
This functionality is restricted by default to admin users; therefore, successful exploitation requires valid credentials with administrative permissions.
References
| Link | Resource |
|---|---|
| https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3961/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-11-05 15:15
Updated : 2025-12-04 21:06
NVD link : CVE-2025-3125
Mitre link : CVE-2025-3125
CVE.ORG link : CVE-2025-3125
JSON object : View
Products Affected
wso2
- api_control_plane
- identity_server
- identity_server_as_key_manager
- traffic_manager
- open_banking_iam
- api_manager
- enterprise_integrator
- universal_gateway
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
