← Retour aux CVEs
CVE-2025-10611
CRITICAL9.8
Description
Due to an insufficient access control implementation in multiple WSO2 Products, authentication and authorization checks for certain REST APIs can be bypassed, allowing them to be invoked without proper validation. Successful exploitation of this vulnerability could lead to a malicious actor gaining administrative access and performing unauthenticated and unauthorized administrative operations.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie10/16/2025
Derniere modification11/21/2025
Sourcenvd
Observations honeypot0
Produits affectes
wso2:api_control_planewso2:api_managerwso2:identity_serverwso2:identity_server_as_key_managerwso2:open_banking_amwso2:open_banking_iamwso2:open_banking_kmwso2:traffic_managerwso2:universal_gateway
Faiblesses (CWE)
CWE-863
References
https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4585/(ed10eef1-636d-4fbe-9993-6890dfa878f8)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.