Description
An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper input validation in the CarbonAppUploader admin service endpoint. An authenticated attacker with appropriate privileges can upload a malicious file to a user-controlled location on the server, potentially leading to remote code execution (RCE). This functionality is restricted by default to admin users; therefore, successful exploitation requires valid credentials with administrative permissions.
References (1)
Core 1
Core References
Vendor Advisory vendor-advisory
https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3961/
Scores
CVSS v3
6.7
EPSS
0.0021
EPSS Percentile
43.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-434
Status
published
Products (19)
wso2/api_control_plane
4.5.0
wso2/api_manager
3.2.0
wso2/api_manager
3.2.1
wso2/api_manager
4.0.0
wso2/api_manager
4.1.0
wso2/api_manager
4.2.0
wso2/api_manager
4.3.0
wso2/api_manager
4.4.0
wso2/api_manager
4.5.0
wso2/enterprise_integrator
6.6.0
... and 9 more
Published
Nov 05, 2025
Tracked Since
Feb 18, 2026