An authenticated remote code execution (RCE) vulnerability exists in multiple WSO2 products due to improper input validation in the event processor admin service. A user with administrative access to the SOAP admin services can exploit this flaw by deploying a Siddhi execution plan containing malicious Java code, resulting in arbitrary code execution on the server. Exploitation of this vulnerability requires a valid user account with administrative privileges, limiting the attack surface to authenticated but potentially malicious users.
2025-09-23T16:15:33.620
2025-11-21T21:34:06.837
Analyzed
ed10eef1-636d-4fbe-9993-6890dfa878f8
CVSSv3.1: 6.8 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | wso2 | api_control_plane | 4.5.0 | Yes |
| Application | wso2 | api_manager | 3.0.0 | Yes |
| Application | wso2 | api_manager | 3.1.0 | Yes |
| Application | wso2 | api_manager | 3.2.0 | Yes |
| Application | wso2 | api_manager | 3.2.1 | Yes |
| Application | wso2 | api_manager | 4.0.0 | Yes |
| Application | wso2 | api_manager | 4.1.0 | Yes |
| Application | wso2 | api_manager | 4.2.0 | Yes |
| Application | wso2 | api_manager | 4.3.0 | Yes |
| Application | wso2 | api_manager | 4.4.0 | Yes |
| Application | wso2 | api_manager | 4.5.0 | Yes |
| Application | wso2 | open_banking_am | 2.0.0 | Yes |
| Application | wso2 | traffic_manager | 4.5.0 | Yes |