Security Advisory WSO2-2025-4119/CVE-2025-5717¶
Published: 2025-07-15
Updated: 2025-10-31
Version: 1.0.1
Severity: Medium
CVSS Score: 6.8 (CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
CVE IDs: CVE-2025-5717
AFFECTED PRODUCTS¶
- WSO2 API Manager: 3.0.0, 3.1.0, 3.2.0, 3.2.1, 4.0.0, 4.1.0, 4.2.0, 4.3.0, 4.4.0, 4.5.0
- WSO2 Open Banking AM: 2.0.0
- WSO2 API Control Plane: 4.5.0
- WSO2 Traffic Manager: 4.5.0
OVERVIEW¶
Authenticated Remote Code Execution vulnerability via event processor admin service.
DESCRIPTION¶
Due to the improper input validation, a remote code execution attack could be carried out via certain admin operations in the event processor admin service.
IMPACT¶
In order to exploit this vulnerability, the malicious actor should have a valid user account which has administrative access to the SOAP Admin Services. If such access could be obtained, a malicious actor could execute arbitrary code on the server by deploying a Siddhi execution plan that contains malicious Java code.
SOLUTION¶
Community Users (Open Source)¶
Apply the relevant fixes to your product using the public fix(es) provided below.
If applying the fix or update is not feasible, migrate to the latest unaffected version of the respective WSO2 product(s).
Support Subscription Holders¶
Update your product to the specified update level or a higher update level to apply the fix.
Info
WSO2 Support Subscription Holders may use WSO2 Updates in order to apply the fix.
| Product Name | Product Version | U2 Update Level |
|---|---|---|
| WSO2 API Manager | 3.0.0 | 174 |
| WSO2 API Manager | 3.1.0 | 330 |
| WSO2 API Manager | 3.2.0 | 426 |
| WSO2 API Manager | 3.2.1 | 46 |
| WSO2 API Manager | 4.0.0 | 344 |
| WSO2 API Manager | 4.1.0 | 208 |
| WSO2 API Manager | 4.2.0 | 147 |
| WSO2 API Manager | 4.3.0 | 59 |
| WSO2 API Manager | 4.4.0 | 22 |
| WSO2 API Manager | 4.5.0 | 6 |
| WSO2 Open Banking AM | 2.0.0 | 379 |
| WSO2 API Control Plane | 4.5.0 | 6 |
| WSO2 Traffic Manager | 4.5.0 | 6 |
CREDITS¶
WSO2 thanks, Noël MACCARY for responsibly reporting the identified issue and working with us as we addressed it.