Vulnerabilites related to WSO2 - WSO2 Micro Integrator
CVE-2023-6836 (GCVE-0-2023-6836)
Vulnerability from cvelistv5
Published
2023-12-15 09:26
Modified
2024-08-02 08:42
CWE
  • CWE-611 - Improper Restriction of XML External Entity Reference
Summary
Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information.
Impacted products
Vendor Product Version
WSO2 WSO2 API Manager Version: 3.0.0.0   < 3.0.0.1
Create a notification for this product.
   WSO2 WSO2 API Manager Analytics Version: 2.2.0.0   < 2.2.0.1
Version: 2.5.0.0   < 2.5.0.1
Create a notification for this product.
   WSO2 WSO2 API Microgateway Version: 2.2.0.0   < 2.2.0.1
Create a notification for this product.
   WSO2 WSO2 Enterprise Integrator Version: 6.0.0.0   < 6.0.0.3
Version: 6.1.0.0   < 6.1.0.5
Version: 6.1.1.0   < 6.1.1.5
Version: 6.6.0.0   < 6.6.0.1
Create a notification for this product.
   WSO2 WSO2 IS as Key Manager Version: 5.5.0.0   < 5.5.0.1
Version: 5.6.0.0   < 5.6.0.1
Version: 5.7.0.0   < 5.7.0.1
Version: 5.9.0.0   < 5.9.0.1
Create a notification for this product.
   WSO2 WSO2 Identity Server Version: 5.4.0.0   < 5.4.0.1
Version: 5.4.1.0   < 5.4.1.1
Version: 5.5.0.0   < 5.5.0.1
Version: 5.6.0.0   < 5.6.0.1
Create a notification for this product.
   WSO2 WSO2 Micro Integrator Version: 1.0.0.0   < 1.0.0.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:42:08.180Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 API Manager ",
          "repo": "https://github.com/wso2/product-apim",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "3.0.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.0.0.1",
              "status": "affected",
              "version": "3.0.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 API Manager Analytics",
          "repo": "https://github.com/wso2/analytics-apim",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "2.2.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.2.0.1",
              "status": "affected",
              "version": "2.2.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.5.0.1",
              "status": "affected",
              "version": "2.5.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 API Microgateway",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "2.2.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.2.0.1",
              "status": "affected",
              "version": "2.2.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Enterprise Integrator",
          "repo": "https://github.com/wso2/product-ei",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "6.0.0.2",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.0.0.3",
              "status": "affected",
              "version": "6.0.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.1.0.5",
              "status": "affected",
              "version": "6.1.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.1.1.5",
              "status": "affected",
              "version": "6.1.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.6.0.1",
              "status": "affected",
              "version": "6.6.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 IS as Key Manager",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "5.5.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.5.0.1",
              "status": "affected",
              "version": "5.5.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.6.0.1",
              "status": "affected",
              "version": "5.6.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.7.0.1",
              "status": "affected",
              "version": "5.7.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.9.0.1",
              "status": "affected",
              "version": "5.9.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Identity Server",
          "repo": "https://github.com/wso2/product-is",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "5.4.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.4.0.1",
              "status": "affected",
              "version": "5.4.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.4.1.1",
              "status": "affected",
              "version": "5.4.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.5.0.1",
              "status": "affected",
              "version": "5.5.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.6.0.1",
              "status": "affected",
              "version": "5.6.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Micro Integrator",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "1.0.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.0.0.1",
              "status": "affected",
              "version": "1.0.0.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information."
            }
          ],
          "value": "Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-250",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-250 XML Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-611",
              "description": "CWE-611 Improper Restriction of XML External Entity Reference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-09T05:03:32.570Z",
        "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
        "shortName": "WSO2"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\u003cbr\u003e\u003cbr\u003eCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/\u003c/a\u003e\u003cbr\u003e"
            }
          ],
          "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in  https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/ https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/ \n"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
    "assignerShortName": "WSO2",
    "cveId": "CVE-2023-6836",
    "datePublished": "2023-12-15T09:26:01.323Z",
    "dateReserved": "2023-12-15T09:25:13.205Z",
    "dateUpdated": "2024-08-02T08:42:08.180Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-4598 (GCVE-0-2024-4598)
Vulnerability from cvelistv5
Published
2025-09-23 10:39
Modified
2025-09-23 19:35
Summary
An information disclosure vulnerability exists in multiple WSO2 products due to improper implementation of the enrich mediator. Authenticated users may be able to view unintended business data from other mediation contexts because the internal state is not properly isolated or cleared between executions. This vulnerability does not impact user credentials or access tokens but may lead to leakage of sensitive business information handled during message flows.
Impacted products
Vendor Product Version
WSO2 WSO2 API Manager Version: 3.2.0   < 3.2.0.422
Version: 3.2.1   < 3.2.1.42
Version: 4.1.0   < 4.1.0.152
Version: 4.3.0   < 4.3.0.55
Create a notification for this product.
   WSO2 WSO2 Micro Integrator Version: 1.2.0   < 1.2.0.157
Version: 4.1.0   < 4.1.0.95
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-4598",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-23T19:35:13.107728Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-1259",
                "description": "CWE-1259 Improper Restriction of Security Token Assignment",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-23T19:35:33.987Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 API Manager",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "3.2.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.2.0.422",
              "status": "affected",
              "version": "3.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.2.1.42",
              "status": "affected",
              "version": "3.2.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.1.0.152",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.3.0.55",
              "status": "affected",
              "version": "4.3.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Micro Integrator",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "1.2.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.2.0.157",
              "status": "affected",
              "version": "1.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.1.0.95",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An information disclosure vulnerability exists in multiple WSO2 products due to improper implementation of the enrich mediator. Authenticated users may be able to view unintended business data from other mediation contexts because the internal state is not properly isolated or cleared between executions.\u003cbr\u003e\u003cbr\u003eThis vulnerability does not impact user credentials or access tokens but may lead to leakage of sensitive business information handled during message flows."
            }
          ],
          "value": "An information disclosure vulnerability exists in multiple WSO2 products due to improper implementation of the enrich mediator. Authenticated users may be able to view unintended business data from other mediation contexts because the internal state is not properly isolated or cleared between executions.\n\nThis vulnerability does not impact user credentials or access tokens but may lead to leakage of sensitive business information handled during message flows."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-23T10:39:16.195Z",
        "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
        "shortName": "WSO2"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3355/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3355/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3355/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e"
            }
          ],
          "value": "Follow the instructions given on  https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3355/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3355/#solution"
        }
      ],
      "source": {
        "advisory": "WSO2-2024-3355",
        "discovery": "INTERNAL"
      },
      "title": "Information Disclosure in Multiple WSO2 Products Due to Improper Handling in Enrich Mediator",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
    "assignerShortName": "WSO2",
    "cveId": "CVE-2024-4598",
    "datePublished": "2025-09-23T10:39:16.195Z",
    "dateReserved": "2024-05-07T06:40:12.013Z",
    "dateUpdated": "2025-09-23T19:35:33.987Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-7074 (GCVE-0-2024-7074)
Vulnerability from cvelistv5
Published
2025-06-02 16:42
Modified
2025-06-02 17:05
CWE
  • CWE-434 - Unrestricted Upload of File with Dangerous Type
Summary
An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server. By leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users.
Impacted products
Vendor Product Version
WSO2 WSO2 Enterprise Integrator Version: 6.0.0   < 6.0.0.21
Version: 6.1.0   < 6.1.0.38
Version: 6.1.1   < 6.1.1.42
Version: 6.2.0   < 6.2.0.61
Version: 6.3.0   < 6.3.0.69
Version: 6.4.0   < 6.4.0.96
Version: 6.5.0   < 6.5.0.102
Version: 6.6.0   < 6.6.0.198
Create a notification for this product.
   WSO2 WSO2 API Manager Version: 2.0.0   < 2.0.0.28
Version: 2.1.0   < 2.1.0.38
Version: 2.2.0   < 2.2.0.57
Version: 2.5.0   < 2.5.0.83
Version: 2.6.0   < 2.6.0.143
Version: 3.0.0   < 3.0.0.162
Version: 3.1.0   < 3.1.0.293
Version: 3.2.0   < 3.2.0.384
Version: 3.2.1   < 3.2.1.16
Version: 4.0.0   < 4.0.0.305
Version: 4.1.0   < 4.1.0.166
Version: 4.2.0   < 4.2.0.100
Version: 4.3.0   < 4.3.0.16
Create a notification for this product.
   WSO2 WSO2 Enterprise Service Bus Version: 4.9.0   < 4.9.0.10
Version: 5.0.0   < 5.0.0.28
Create a notification for this product.
   WSO2 WSO2 Enterprise Mobility Manager Version: 2.2.0   < 2.2.0.27
Create a notification for this product.
   WSO2 WSO2 Micro Integrator Version: 1.0.0   < 1.0.0.49
Create a notification for this product.
   WSO2 WSO2 Open Banking AM Version: 1.3.0   < 1.3.0.132
Version: 1.4.0   < 1.4.0.135
Version: 1.5.0   < 1.5.0.137
Version: 2.0.0   < 2.0.0.342
Create a notification for this product.
   WSO2 WSO2 Carbon Synapse Artifact Uploader BE Version: 4.4.10   < 4.4.10.3
Version: 4.6.1   < 4.6.1.4
Version: 4.6.6   < 4.6.6.9
Version: 4.6.10   < 4.6.10.4
Version: 4.6.16   < 4.6.16.2
Version: 4.6.19   < 4.6.19.10
Version: 4.6.64   < 4.6.64.2
Version: 4.6.67   < 4.6.67.15
Version: 4.6.89   < 4.6.89.12
Version: 4.6.105   < 4.6.105.59
Version: 4.6.150   < 4.6.150.11
Version: 4.7.20   < 4.7.20.5
Version: 4.7.30   < 4.7.30.42
Version: 4.7.35   < 4.7.35.5
Version: 4.7.61   < 4.7.61.56
Version: 4.7.99   < 4.7.99.299
Version: 4.7.131   < 4.7.131.15
Version: 4.7.175   < 4.7.175.18
Version: 4.7.188   < 4.7.188.5
Version: 4.7.204   < 4.7.204.5
Patch: 4.7.216
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-7074",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-02T17:04:40.480620Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-02T17:05:49.920Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Enterprise Integrator",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "6.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.0.0.21",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.1.0.38",
              "status": "affected",
              "version": "6.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.1.1.42",
              "status": "affected",
              "version": "6.1.1",
              "versionType": "custom"
            },
            {
              "lessThan": "6.2.0.61",
              "status": "affected",
              "version": "6.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.3.0.69",
              "status": "affected",
              "version": "6.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.4.0.96",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.5.0.102",
              "status": "affected",
              "version": "6.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.6.0.198",
              "status": "affected",
              "version": "6.6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 API Manager",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "2.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.0.28",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.1.0.38",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.2.0.57",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.5.0.83",
              "status": "affected",
              "version": "2.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.6.0.143",
              "status": "affected",
              "version": "2.6.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.0.0.162",
              "status": "affected",
              "version": "3.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.1.0.293",
              "status": "affected",
              "version": "3.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.2.0.384",
              "status": "affected",
              "version": "3.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "3.2.1.16",
              "status": "affected",
              "version": "3.2.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.0.0.305",
              "status": "affected",
              "version": "4.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.1.0.166",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.2.0.100",
              "status": "affected",
              "version": "4.2.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.3.0.16",
              "status": "affected",
              "version": "4.3.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "WSO2 Enterprise Service Bus",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "4.9.0.10",
              "status": "affected",
              "version": "4.9.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.0.0.28",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "WSO2 Enterprise Mobility Manager",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "2.2.0.27",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Micro Integrator",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "1.0.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.0.0.49",
              "status": "affected",
              "version": "1.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WSO2 Open Banking AM",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "1.3.0",
              "status": "unknown",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.3.0.132",
              "status": "affected",
              "version": "1.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.4.0.135",
              "status": "affected",
              "version": "1.4.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.5.0.137",
              "status": "affected",
              "version": "1.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.0.0.342",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "packageName": "org.wso2.carbon.mediation:org.wso2.carbon.mediation.artifactuploader",
          "product": "WSO2 Carbon Synapse Artifact Uploader BE",
          "vendor": "WSO2",
          "versions": [
            {
              "lessThan": "4.4.10.3",
              "status": "affected",
              "version": "4.4.10",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.1.4",
              "status": "affected",
              "version": "4.6.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.6.9",
              "status": "affected",
              "version": "4.6.6",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.10.4",
              "status": "affected",
              "version": "4.6.10",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.16.2",
              "status": "affected",
              "version": "4.6.16",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.19.10",
              "status": "affected",
              "version": "4.6.19",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.64.2",
              "status": "affected",
              "version": "4.6.64",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.67.15",
              "status": "affected",
              "version": "4.6.67",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.89.12",
              "status": "affected",
              "version": "4.6.89",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.105.59",
              "status": "affected",
              "version": "4.6.105",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.150.11",
              "status": "affected",
              "version": "4.6.150",
              "versionType": "custom"
            },
            {
              "lessThan": "4.7.20.5",
              "status": "affected",
              "version": "4.7.20",
              "versionType": "custom"
            },
            {
              "lessThan": "4.7.30.42",
              "status": "affected",
              "version": "4.7.30",
              "versionType": "custom"
            },
            {
              "lessThan": "4.7.35.5",
              "status": "affected",
              "version": "4.7.35",
              "versionType": "custom"
            },
            {
              "lessThan": "4.7.61.56",
              "status": "affected",
              "version": "4.7.61",
              "versionType": "custom"
            },
            {
              "lessThan": "4.7.99.299",
              "status": "affected",
              "version": "4.7.99",
              "versionType": "custom"
            },
            {
              "lessThan": "4.7.131.15",
              "status": "affected",
              "version": "4.7.131",
              "versionType": "custom"
            },
            {
              "lessThan": "4.7.175.18",
              "status": "affected",
              "version": "4.7.175",
              "versionType": "custom"
            },
            {
              "lessThan": "4.7.188.5",
              "status": "affected",
              "version": "4.7.188",
              "versionType": "custom"
            },
            {
              "lessThan": "4.7.204.5",
              "status": "affected",
              "version": "4.7.204",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "4.7.216",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Anonymous working with Trend Micro Zero Day Initiative"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server.\u003cbr\u003e\u003cbr\u003eBy leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users.\u003cbr\u003e"
            }
          ],
          "value": "An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server.\n\nBy leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-434",
              "description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-02T16:42:19.264Z",
        "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
        "shortName": "WSO2"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3566/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Follow the instructions given on \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3566/#solution\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3...\u003c/a\u003e \u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "Follow the instructions given on  https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3566/#solution"
        }
      ],
      "source": {
        "advisory": "WSO2-2024-3566",
        "discovery": "EXTERNAL"
      },
      "title": "Authenticated Arbitrary File Upload in Multiple WSO2 Products via SOAP Admin Service Leading to Remote Code Execution",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
    "assignerShortName": "WSO2",
    "cveId": "CVE-2024-7074",
    "datePublished": "2025-06-02T16:42:19.264Z",
    "dateReserved": "2024-07-24T12:15:52.796Z",
    "dateUpdated": "2025-06-02T17:05:49.920Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}