CVE-2025-6670

HIGH

Wso2 API Control Plane - CSRF

Title source: rule

Description

A Cross-Site Request Forgery (CSRF) vulnerability exists in multiple WSO2 products due to the use of the HTTP GET method for state-changing operations within admin services, specifically in the event processor of the Carbon console. Although the SameSite=Lax cookie attribute is used as a mitigation, it is ineffective in this context because it allows cookies to be sent with cross-origin top-level navigations using GET requests. A malicious actor can exploit this vulnerability by tricking an authenticated user into visiting a crafted link, leading the browser to issue unintended state-changing requests. Successful exploitation could result in unauthorized operations such as data modification, account changes, or other administrative actions. According to WSO2 Secure Production Guidelines, exposure of Carbon console services to untrusted networks is discouraged, which may reduce the impact in properly secured deployments.

Scores

CVSS v3 8.8
EPSS 0.0003
EPSS Percentile 6.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Classification

CWE
CWE-352
Status published

Affected Products (27)

wso2/api_control_plane
wso2/api_control_plane
wso2/api_manager
wso2/api_manager
wso2/api_manager
wso2/api_manager
wso2/api_manager
wso2/api_manager
wso2/api_manager
wso2/api_manager
wso2/api_manager
wso2/api_manager
wso2/enterprise_integrator
wso2/identity_server
wso2/identity_server
... and 12 more

Timeline

Published Nov 18, 2025
Tracked Since Feb 18, 2026