An authenticated remote code execution (RCE) vulnerability exists in multiple WSO2 products due to improper input validation in the event processor admin service. A user with administrative access to the SOAP admin services can exploit this flaw by deploying a Siddhi execution plan containing malicious Java code, resulting in arbitrary code execution on the server.
Exploitation of this vulnerability requires a valid user account with administrative privileges, limiting the attack surface to authenticated but potentially malicious users.
References
| Link | Resource |
|---|---|
| https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4119/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-09-23 16:15
Updated : 2025-11-21 21:34
NVD link : CVE-2025-5717
Mitre link : CVE-2025-5717
CVE.ORG link : CVE-2025-5717
JSON object : View
Products Affected
wso2
- api_control_plane
- open_banking_am
- api_manager
- traffic_manager
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
