Security Advisory WSO2-2025-4117/CVE-2025-6670¶
Published: 2025-11-14
Version: 1.0.0
Severity: High
CVSS Score: 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVE IDs: CVE-2025-6670
AFFECTED PRODUCTS¶
- WSO2 API Control Plane: 4.6.0, 4.5.0
- WSO2 API Manager: 4.6.0, 4.5.0, 4.4.0, 4.3.0, 4.2.0, 4.1.0, 4.0.0, 3.2.1, 3.2.0, 3.1.0
- WSO2 Enterprise Integrator: 6.6.0
- WSO2 Identity Server: 7.2.0, 7.1.0, 7.0.0, 6.1.0, 6.0.0, 5.11.0, 5.10.0
- WSO2 Identity Server as Key Manager: 5.10.0
- WSO2 Open Banking AM: 2.0.0
- WSO2 Open Banking IAM: 2.0.0
- WSO2 Traffic Manager: 4.6.0, 4.5.0
- WSO2 Universal Gateway: 4.6.0, 4.5.0
OVERVIEW¶
Cross Site Request Forgery (CSRF) in Admin Services.
DESCRIPTION¶
Due to the use of the HTTP GET method for a state-changing operation in the event processor of the carbon console, a Cross-Site Request Forgery (CSRF) vulnerability exists. Although the service endpoints rely on the SameSite=Lax cookie attribute for CSRF mitigation, this mechanism is ineffective in this context, as SameSite=Lax allows cookies to be sent with cross-origin top-level navigation requests, including GET requests. As a result, an attacker could exploit this vulnerability to perform unauthorized actions on behalf of authenticated users. However, according to WSO2 Secure Production Guidelines [^1], exposing the Carbon console and related services to the public internet is not recommended.
IMPACT¶
By leveraging the CSRF attack, a malicious actor can trick an authenticated user’s browser into unknowingly executing unintended actions on a vulnerable web application. This may result in unauthorized operations such as data modification, account changes, or other state-altering requests, potentially leading to data compromise, privilege escalation, or loss of user control over their account.
SOLUTION¶
Community Users (Open Source)¶
Apply the relevant fixes to your product using the public fix(es) provided below.
If applying the fix or update is not feasible, migrate to the latest unaffected version of the respective WSO2 product(s).
Support Subscription Holders¶
Update your product to the specified update level or a higher update level to apply the fix.
Info
WSO2 Support Subscription Holders may use WSO2 Updates in order to apply the fix.
| Product Name | Product Version | U2 Update Level |
|---|---|---|
| WSO2 API Control Plane | 4.6.0 | 1 |
| WSO2 API Control Plane | 4.5.0 | 36 |
| WSO2 API Manager | 4.6.0 | 1 |
| WSO2 API Manager | 4.5.0 | 35 |
| WSO2 API Manager | 4.4.0 | 52 |
| WSO2 API Manager | 4.3.0 | 88 |
| WSO2 API Manager | 4.2.0 | 176 |
| WSO2 API Manager | 4.1.0 | 236 |
| WSO2 API Manager | 4.0.0 | 373 |
| WSO2 API Manager | 3.2.1 | 73 |
| WSO2 API Manager | 3.2.0 | 453 |
| WSO2 API Manager | 3.1.0 | 349 |
| WSO2 Enterprise Integrator | 6.6.0 | 226 |
| WSO2 Identity Server | 7.2.0 | 1 |
| WSO2 Identity Server | 7.1.0 | 38 |
| WSO2 Identity Server | 7.0.0 | 130 |
| WSO2 Identity Server | 6.1.0 | 253 |
| WSO2 Identity Server | 6.0.0 | 252 |
| WSO2 Identity Server | 5.11.0 | 425 |
| WSO2 Identity Server | 5.10.0 | 378 |
| WSO2 Identity Server as Key Manager | 5.10.0 | 369 |
| WSO2 Open Banking AM | 2.0.0 | 398 |
| WSO2 Open Banking IAM | 2.0.0 | 418 |
| WSO2 Traffic Manager | 4.6.0 | 1 |
| WSO2 Traffic Manager | 4.5.0 | 34 |
| WSO2 Universal Gateway | 4.6.0 | 1 |
| WSO2 Universal Gateway | 4.5.0 | 34 |
Referances¶
CREDITS¶
WSO2 thanks, Noël MACCARY for responsibly reporting the identified issue and working with us as we addressed it.