Security Advisory WSO2-2025-4525/CVE-2025-11229¶
Published: 2026-01-26
Version: 1.0.0
Severity: High
CVSS Score: 7.2 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
CVE IDs: CVE-2025-11229
AFFECTED PRODUCTS¶
- WSO2 Identity Server: 7.1.0, 7.0.0
OVERVIEW¶
Potential Privilege Escalation via Client Credentials grant type.
DESCRIPTION¶
This vulnerability is only applicable to deployments where the authorize_all_scopes configuration is enabled in deployment.toml. By default, this configuration is disabled in WSO2 products. When the said configuration is enabled, applications can obtain all API scopes, including sensitive internal and console scopes, through the client credentials grant type without explicit authorization. This misconfiguration bypasses intended access controls, potentially allowing unprivileged clients to perform administrative actions or access confidential data.
IMPACT¶
Exploitation of this vulnerability may lead to privilege escalation, unauthorized administrative actions, exposure of sensitive organizational data, and potential full account takeover, in deployments where the authorize_all_scopes config is enabled deviating from the default configuration.
SOLUTION¶
You do not need to take any additional action if the following configuration is not present in the <Product_Home>/repository/conf/deployment.toml file, or if it is explicitly set to false as shown below, since this disables the vulnerable behavior:
[oauth]
authorize_all_scopes = false
Community Users (Open Source)¶
Apply the relevant fixes to your product using the public fix(es) provided below.
If applying the fix or update is not feasible, migrate to the latest unaffected version of the respective WSO2 product(s).
Support Subscription Holders¶
Update your product to the specified update level, or to a higher update level, to mitigate the identified vulnerability.
Info
WSO2 Support Subscription Holders may use WSO2 Updates in order to apply the fix.
| Product Name | Product Version | Update Level |
|---|---|---|
| WSO2 Identity Server | 7.1.0 | 32 |
| WSO2 Identity Server | 7.0.0 | 125 |
Once you apply the fix using one of the methods mentioned above, add the following configuration to the <Product_Home>/repository/conf/deployment.toml file to prevent the issue management API–related scopes from being granted through the Client Credentials grant type.
All business-related scopes will continue to be issued as expected, regardless of the defined application scope.
[oauth]
authorize_all_scopes = true
authorize_internal_scopes = false