Security Advisory WSO2-2025-4117/CVE-2025-6670

Published: 2025-11-14

Version: 1.0.0

Severity: High

CVSS Score: 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

CVE IDs: CVE-2025-6670


AFFECTED PRODUCTS

  • WSO2 API Control Plane: 4.6.0, 4.5.0
  • WSO2 API Manager: 4.6.0, 4.5.0, 4.4.0, 4.3.0, 4.2.0, 4.1.0, 4.0.0, 3.2.1, 3.2.0, 3.1.0
  • WSO2 Enterprise Integrator: 6.6.0
  • WSO2 Identity Server: 7.2.0, 7.1.0, 7.0.0, 6.1.0, 6.0.0, 5.11.0, 5.10.0
  • WSO2 Identity Server as Key Manager: 5.10.0
  • WSO2 Open Banking AM: 2.0.0
  • WSO2 Open Banking IAM: 2.0.0
  • WSO2 Traffic Manager: 4.6.0, 4.5.0
  • WSO2 Universal Gateway: 4.6.0, 4.5.0

OVERVIEW

Cross Site Request Forgery (CSRF) in Admin Services.

DESCRIPTION

Due to the use of the HTTP GET method for a state-changing operation in the event processor of the carbon console, a Cross-Site Request Forgery (CSRF) vulnerability exists. Although the service endpoints rely on the SameSite=Lax cookie attribute for CSRF mitigation, this mechanism is ineffective in this context, as SameSite=Lax allows cookies to be sent with cross-origin top-level navigation requests, including GET requests. As a result, an attacker could exploit this vulnerability to perform unauthorized actions on behalf of authenticated users. However, according to WSO2 Secure Production Guidelines [^1], exposing the Carbon console and related services to the public internet is not recommended.

IMPACT

By leveraging the CSRF attack, a malicious actor can trick an authenticated user’s browser into unknowingly executing unintended actions on a vulnerable web application. This may result in unauthorized operations such as data modification, account changes, or other state-altering requests, potentially leading to data compromise, privilege escalation, or loss of user control over their account.

SOLUTION

Community Users (Open Source)

Apply the relevant fixes to your product using the public fix(es) provided below.

If applying the fix or update is not feasible, migrate to the latest unaffected version of the respective WSO2 product(s).

Support Subscription Holders

Update your product to the specified update level or a higher update level to apply the fix.

Info

WSO2 Support Subscription Holders may use WSO2 Updates in order to apply the fix.

Product Name Product Version U2 Update Level
WSO2 API Control Plane 4.6.0 1
WSO2 API Control Plane 4.5.0 36
WSO2 API Manager 4.6.0 1
WSO2 API Manager 4.5.0 35
WSO2 API Manager 4.4.0 52
WSO2 API Manager 4.3.0 88
WSO2 API Manager 4.2.0 176
WSO2 API Manager 4.1.0 236
WSO2 API Manager 4.0.0 373
WSO2 API Manager 3.2.1 73
WSO2 API Manager 3.2.0 453
WSO2 API Manager 3.1.0 349
WSO2 Enterprise Integrator 6.6.0 226
WSO2 Identity Server 7.2.0 1
WSO2 Identity Server 7.1.0 38
WSO2 Identity Server 7.0.0 130
WSO2 Identity Server 6.1.0 253
WSO2 Identity Server 6.0.0 252
WSO2 Identity Server 5.11.0 425
WSO2 Identity Server 5.10.0 378
WSO2 Identity Server as Key Manager 5.10.0 369
WSO2 Open Banking AM 2.0.0 398
WSO2 Open Banking IAM 2.0.0 418
WSO2 Traffic Manager 4.6.0 1
WSO2 Traffic Manager 4.5.0 34
WSO2 Universal Gateway 4.6.0 1
WSO2 Universal Gateway 4.5.0 34

Referances

[^1] https://security.docs.wso2.com/en/latest/security-guidelines/security-guidelines-for-production-deployment

CREDITS

WSO2 thanks, Noël MACCARY for responsibly reporting the identified issue and working with us as we addressed it.