← Voltar para CVEs
CVE-2025-10611
CRITICAL9.8
Descricao
Due to an insufficient access control implementation in multiple WSO2 Products, authentication and authorization checks for certain REST APIs can be bypassed, allowing them to be invoked without proper validation. Successful exploitation of this vulnerability could lead to a malicious actor gaining administrative access and performing unauthenticated and unauthorized administrative operations.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado10/16/2025
Ultima modificacao11/21/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
wso2:api_control_planewso2:api_managerwso2:identity_serverwso2:identity_server_as_key_managerwso2:open_banking_amwso2:open_banking_iamwso2:open_banking_kmwso2:traffic_managerwso2:universal_gateway
Fraquezas (CWE)
CWE-863
Referencias
https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4585/(ed10eef1-636d-4fbe-9993-6890dfa878f8)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.