Action not permitted
Modal body text goes here.
Modal Title
Modal Body
ghsa-q35x-jjjw-76gp
Vulnerability from github
Published
2025-10-16 15:30
Modified
2025-10-16 15:30
Severity ?
VLAI Severity ?
Details
Due to an insufficient access control implementation in multiple WSO2 Products, authentication and authorization checks for certain REST APIs can be bypassed, allowing them to be invoked without proper validation.
Successful exploitation of this vulnerability could lead to a malicious actor gaining administrative access and performing unauthenticated and unauthorized administrative operations.
{ "affected": [], "aliases": [ "CVE-2025-10611" ], "database_specific": { "cwe_ids": [ "CWE-863" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-16T13:15:40Z", "severity": "CRITICAL" }, "details": "Due to an insufficient access control implementation in multiple WSO2 Products, authentication and authorization checks for certain REST APIs can be bypassed, allowing them to be invoked without proper validation.\n\nSuccessful exploitation of this vulnerability could lead to a malicious actor gaining administrative access and performing unauthenticated and unauthorized administrative operations.", "id": "GHSA-q35x-jjjw-76gp", "modified": "2025-10-16T15:30:43Z", "published": "2025-10-16T15:30:42Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10611" }, { "type": "WEB", "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4585" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
CVE-2025-10611 (GCVE-0-2025-10611)
Vulnerability from cvelistv5
Published
2025-10-16 12:09
Modified
2025-10-16 13:34
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Due to an insufficient access control implementation in multiple WSO2 Products, authentication and authorization checks for certain REST APIs can be bypassed, allowing them to be invoked without proper validation.
Successful exploitation of this vulnerability could lead to a malicious actor gaining administrative access and performing unauthenticated and unauthorized administrative operations.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 2.1.0 < 2.1.0.42 Version: 2.2.0 < 2.2.0.61 Version: 2.5.0 < 2.5.0.87 Version: 2.6.0 < 2.6.0.148 Version: 3.0.0 < 3.0.0.178 Version: 3.1.0 < 3.1.0.345 Version: 3.2.0 < 3.2.0.446 Version: 3.2.1 < 3.2.1.66 Version: 4.0.0 < 4.0.0.366 Version: 4.1.0 < 4.1.0.228 Version: 4.2.0 < 4.2.0.169 Version: 4.3.0 < 4.3.0.81 Version: 4.4.0 < 4.4.0.45 Version: 4.5.0 < 4.5.0.28 |
|||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-10611", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-10-16T13:24:33.931504Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-16T13:34:31.799Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "2.1.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.1.0.42", "status": "affected", "version": "2.1.0", "versionType": "custom" }, { "lessThan": "2.2.0.61", "status": "affected", "version": "2.2.0", "versionType": "custom" }, { "lessThan": "2.5.0.87", "status": "affected", "version": "2.5.0", "versionType": "custom" }, { "lessThan": "2.6.0.148", "status": "affected", "version": "2.6.0", "versionType": "custom" }, { "lessThan": "3.0.0.178", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThan": "3.1.0.345", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.2.0.446", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.66", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.0.0.366", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.228", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.169", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.81", "status": "affected", "version": "4.3.0", "versionType": "custom" }, { "lessThan": "4.4.0.45", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.5.0.28", "status": "affected", "version": "4.5.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Control Plane", "vendor": "WSO2", "versions": [ { "lessThan": "4.5.0.29", "status": "affected", "version": "4.5.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking AM", "vendor": "WSO2", "versions": [ { "lessThan": "1.4.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.4.0.141", "status": "affected", "version": "1.4.0", "versionType": "custom" }, { "lessThan": "1.5.0.142", "status": "affected", "version": "1.5.0", "versionType": "custom" }, { "lessThan": "2.0.0.394", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking IAM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.414", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "vendor": "WSO2", "versions": [ { "lessThan": "5.3.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.3.0.39", "status": "affected", "version": "5.3.0", "versionType": "custom" }, { "lessThan": "5.5.0.54", "status": "affected", "version": "5.5.0", "versionType": "custom" }, { "lessThan": "5.6.0.62", "status": "affected", "version": "5.6.0", "versionType": "custom" }, { "lessThan": "5.7.0.128", "status": "affected", "version": "5.7.0", "versionType": "custom" }, { "lessThan": "5.8.0.112", "status": "affected", "version": "5.8.0", "versionType": "custom" }, { "lessThan": "5.9.0.171", "status": "affected", "version": "5.9.0", "versionType": "custom" }, { "lessThan": "5.10.0.375", "status": "affected", "version": "5.10.0", "versionType": "custom" }, { "lessThan": "5.11.0.419", "status": "affected", "version": "5.11.0", "versionType": "custom" }, { "lessThan": "6.0.0.248", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.248", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "7.0.0.124", "status": "affected", "version": "7.0.0", "versionType": "custom" }, { "lessThan": "7.1.0.31", "status": "affected", "version": "7.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.3.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.3.0.44", "status": "affected", "version": "5.3.0", "versionType": "custom" }, { "lessThan": "5.5.0.55", "status": "affected", "version": "5.5.0", "versionType": "custom" }, { "lessThan": "5.6.0.77", "status": "affected", "version": "5.6.0", "versionType": "custom" }, { "lessThan": "5.7.0.127", "status": "affected", "version": "5.7.0", "versionType": "custom" }, { "lessThan": "5.9.0.178", "status": "affected", "version": "5.9.0", "versionType": "custom" }, { "lessThan": "5.10.0.365", "status": "affected", "version": "5.10.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking KM", "vendor": "WSO2", "versions": [ { "lessThan": "1.4.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.4.0.135", "status": "affected", "version": "1.4.0", "versionType": "custom" }, { "lessThan": "1.5.0.125", "status": "affected", "version": "1.5.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Universal Gateway", "vendor": "WSO2", "versions": [ { "lessThan": "4.5.0.27", "status": "affected", "version": "4.5.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Traffic Manager", "vendor": "WSO2", "versions": [ { "lessThan": "4.5.0.27", "status": "affected", "version": "4.5.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "packageName": "org.wso2.carbon.identity.auth.rest:org.wso2.carbon.identity.auth.service", "product": "org.wso2.carbon.identity.auth.rest:org.wso2.carbon.identity.auth.service", "vendor": "WSO2", "versions": [ { "lessThan": "1.1.1.7", "status": "affected", "version": "1.1.1", "versionType": "custom" }, { "lessThan": "1.1.16.6", "status": "affected", "version": "1.1.16", "versionType": "custom" }, { "lessThan": "1.1.18.7", "status": "affected", "version": "1.1.18", "versionType": "custom" }, { "lessThan": "1.1.20.9", "status": "affected", "version": "1.1.20", "versionType": "custom" }, { "lessThan": "1.1.26.11", "status": "affected", "version": "1.1.26", "versionType": "custom" }, { "lessThan": "1.3.6.11", "status": "affected", "version": "1.3.6", "versionType": "custom" }, { "lessThan": "1.4.0.21", "status": "affected", "version": "1.4.0", "versionType": "custom" }, { "lessThan": "1.4.25.27", "status": "affected", "version": "1.4.25", "versionType": "custom" }, { "lessThan": "1.4.52.6", "status": "affected", "version": "1.4.52", "versionType": "custom" }, { "lessThan": "1.6.1.12", "status": "affected", "version": "1.6.1", "versionType": "custom" }, { "lessThan": "1.7.1.7", "status": "affected", "version": "1.7.1", "versionType": "custom" }, { "lessThan": "1.8.11.8", "status": "affected", "version": "1.8.11", "versionType": "custom" }, { "lessThan": "1.8.41.4", "status": "affected", "version": "1.8.41", "versionType": "custom" }, { "lessThan": "1.9.4.9", "status": "affected", "version": "1.9.4", "versionType": "custom" }, { "lessThan": "1.9.18.7", "status": "affected", "version": "1.9.18", "versionType": "custom" }, { "lessThan": "1.8.48", "status": "affected", "version": "1.8", "versionType": "custom" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "1.9.46", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "packageName": "org.wso2.carbon.identity.auth.rest:org.wso2.carbon.identity.auth.valve", "product": "org.wso2.carbon.identity.auth.rest:org.wso2.carbon.identity.auth.valve", "vendor": "WSO2", "versions": [ { "lessThan": "1.1.1.7", "status": "affected", "version": "1.1.1", "versionType": "custom" }, { "lessThan": "1.1.16.6", "status": "affected", "version": "1.1.16", "versionType": "custom" }, { "lessThan": "1.1.18.7", "status": "affected", "version": "1.1.18", "versionType": "custom" }, { "lessThan": "1.1.20.9", "status": "affected", "version": "1.1.20", "versionType": "custom" }, { "lessThan": "1.1.26.11", "status": "affected", "version": "1.1.26", "versionType": "custom" }, { "lessThan": "1.3.6.11", "status": "affected", "version": "1.3.6", "versionType": "custom" }, { "lessThan": "1.4.0.21", "status": "affected", "version": "1.4.0", "versionType": "custom" }, { "lessThan": "1.4.25.27", "status": "affected", "version": "1.4.25", "versionType": "custom" }, { "lessThan": "1.4.52.6", "status": "affected", "version": "1.4.52", "versionType": "custom" }, { "lessThan": "1.6.1.12", "status": "affected", "version": "1.6.1", "versionType": "custom" }, { "lessThan": "1.7.1.7", "status": "affected", "version": "1.7.1", "versionType": "custom" }, { "lessThan": "1.8.11.8", "status": "affected", "version": "1.8.11", "versionType": "custom" }, { "lessThan": "1.8.41.4", "status": "affected", "version": "1.8.41", "versionType": "custom" }, { "lessThan": "1.9.4.9", "status": "affected", "version": "1.9.4", "versionType": "custom" }, { "lessThan": "1.9.18.7", "status": "affected", "version": "1.9.18", "versionType": "custom" }, { "lessThan": "1.8.48", "status": "affected", "version": "1.8", "versionType": "custom" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "1.9.46", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Due to an insufficient access control implementation in multiple WSO2 Products, authentication and authorization checks for certain REST APIs can be bypassed, allowing them to be invoked without proper validation.\u003cbr\u003e\u003cbr\u003eSuccessful exploitation of this vulnerability could lead to a malicious actor gaining administrative access and performing unauthenticated and unauthorized administrative operations.\u003cbr\u003e" } ], "value": "Due to an insufficient access control implementation in multiple WSO2 Products, authentication and authorization checks for certain REST APIs can be bypassed, allowing them to be invoked without proper validation.\n\nSuccessful exploitation of this vulnerability could lead to a malicious actor gaining administrative access and performing unauthenticated and unauthorized administrative operations." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-16T12:09:31.802Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4585/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4585/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4585/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4585/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4585/#solution" } ], "source": { "advisory": "WSO2-2025-4585", "discovery": "INTERNAL" }, "title": "Potential Broken Access Control in Multiple WSO2 Products via System REST APIs", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2025-10611", "datePublished": "2025-10-16T12:09:31.802Z", "dateReserved": "2025-09-17T08:56:27.794Z", "dateUpdated": "2025-10-16T13:34:31.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…