Security Advisory WSO2-2025-4849/CVE-2025-13590

Published: 2026-01-23

Version: 1.0.0

Severity: Critical

CVSS Score: 9.1 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)

CVE IDs: CVE-2025-13590


AFFECTED PRODUCTS

  • WSO2 API Control Plane: 4.6.0, 4.5.0
  • WSO2 API Manager: 4.6.0, 4.5.0, 4.4.0, 4.3.0, 4.2.0
  • WSO2 Traffic Manager: 4.6.0, 4.5.0
  • WSO2 Universal Gateway: 4.6.0, 4.5.0

OVERVIEW

Authenticated arbitrary file upload via a System REST API requiring administrator permission.

DESCRIPTION

A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution.

IMPACT

By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.

SOLUTION

Community Users (Open Source)

Apply the relevant fixes to your product using the public fix(es) provided below.

If applying the fix or update is not feasible, migrate to the latest unaffected version of the respective WSO2 product(s).

Support Subscription Holders

Update your product to the specified update level, or to a higher update level, to mitigate the identified vulnerability.

Info

WSO2 Support Subscription Holders may use WSO2 Updates in order to apply the fix.

Product Name Product Version Update Level
WSO2 API Control Plane 4.6.0 3
WSO2 API Control Plane 4.5.0 39
WSO2 API Manager 4.6.0 3
WSO2 API Manager 4.5.0 38
WSO2 API Manager 4.4.0 55
WSO2 API Manager 4.3.0 91
WSO2 API Manager 4.2.0 179
WSO2 Traffic Manager 4.6.0 3
WSO2 Traffic Manager 4.5.0 37
WSO2 Universal Gateway 4.6.0 3
WSO2 Universal Gateway 4.5.0 37