An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper input validation in the CarbonAppUploader admin service endpoint. An authenticated attacker with appropriate privileges can upload a malicious file to a user-controlled location on the server, potentially leading to remote code execution (RCE).
This functionality is restricted by default to admin users; therefore, successful exploitation requires valid credentials with administrative permissions.
Metrics
Affected Vendors & Products
References
History
Thu, 06 Nov 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wso2
Wso2 api Control Plane Wso2 api Manager Wso2 carbon Wso2 enterprise Integrator Wso2 identity Server Wso2 identity Server As Key Manager Wso2 open Banking Iam Wso2 traffic Manager Wso2 universal Gateway |
|
| Vendors & Products |
Wso2
Wso2 api Control Plane Wso2 api Manager Wso2 carbon Wso2 enterprise Integrator Wso2 identity Server Wso2 identity Server As Key Manager Wso2 open Banking Iam Wso2 traffic Manager Wso2 universal Gateway |
Wed, 05 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 05 Nov 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper input validation in the CarbonAppUploader admin service endpoint. An authenticated attacker with appropriate privileges can upload a malicious file to a user-controlled location on the server, potentially leading to remote code execution (RCE). This functionality is restricted by default to admin users; therefore, successful exploitation requires valid credentials with administrative permissions. | |
| Title | Authenticated Arbitrary File Upload in Multiple WSO2 Products via CarbonAppUploader Admin Service Leading to Remote Code Execution | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: WSO2
Published: 2025-11-05T14:49:44.597Z
Updated: 2025-11-05T18:59:01.426Z
Reserved: 2025-04-02T15:12:12.137Z
Link: CVE-2025-3125
Updated: 2025-11-05T18:58:57.362Z
Status : Awaiting Analysis
Published: 2025-11-05T15:15:33.953
Modified: 2025-11-06T19:45:30.990
Link: CVE-2025-3125
No data.