Security Advisory WSO2-2025-4849/CVE-2025-13590¶
Published: 2026-01-23
Version: 1.0.0
Severity: Critical
CVSS Score: 9.1 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)
CVE IDs: CVE-2025-13590
AFFECTED PRODUCTS¶
- WSO2 API Control Plane: 4.6.0, 4.5.0
- WSO2 API Manager: 4.6.0, 4.5.0, 4.4.0, 4.3.0, 4.2.0
- WSO2 Traffic Manager: 4.6.0, 4.5.0
- WSO2 Universal Gateway: 4.6.0, 4.5.0
OVERVIEW¶
Authenticated arbitrary file upload via a System REST API requiring administrator permission.
DESCRIPTION¶
A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution.
IMPACT¶
By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.
SOLUTION¶
Community Users (Open Source)¶
Apply the relevant fixes to your product using the public fix(es) provided below.
If applying the fix or update is not feasible, migrate to the latest unaffected version of the respective WSO2 product(s).
Support Subscription Holders¶
Update your product to the specified update level, or to a higher update level, to mitigate the identified vulnerability.
Info
WSO2 Support Subscription Holders may use WSO2 Updates in order to apply the fix.
| Product Name | Product Version | Update Level |
|---|---|---|
| WSO2 API Control Plane | 4.6.0 | 3 |
| WSO2 API Control Plane | 4.5.0 | 39 |
| WSO2 API Manager | 4.6.0 | 3 |
| WSO2 API Manager | 4.5.0 | 38 |
| WSO2 API Manager | 4.4.0 | 55 |
| WSO2 API Manager | 4.3.0 | 91 |
| WSO2 API Manager | 4.2.0 | 179 |
| WSO2 Traffic Manager | 4.6.0 | 3 |
| WSO2 Traffic Manager | 4.5.0 | 37 |
| WSO2 Universal Gateway | 4.6.0 | 3 |
| WSO2 Universal Gateway | 4.5.0 | 37 |