Due to an insufficient access control implementation in multiple WSO2 Products, authentication and authorization checks for certain REST APIs can be bypassed, allowing them to be invoked without proper validation.
Successful exploitation of this vulnerability could lead to a malicious actor gaining administrative access and performing unauthenticated and unauthorized administrative operations.
Metrics
Affected Vendors & Products
References
History
Thu, 16 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-863 | |
Metrics |
ssvc
|
Thu, 16 Oct 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to an insufficient access control implementation in multiple WSO2 Products, authentication and authorization checks for certain REST APIs can be bypassed, allowing them to be invoked without proper validation. Successful exploitation of this vulnerability could lead to a malicious actor gaining administrative access and performing unauthenticated and unauthorized administrative operations. | |
Title | Potential Broken Access Control in Multiple WSO2 Products via System REST APIs | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2025-10-16T13:34:31.799Z
Reserved: 2025-09-17T08:56:27.794Z
Link: CVE-2025-10611

Updated: 2025-10-16T13:24:43.729Z

Status : Received
Published: 2025-10-16T13:15:40.640
Modified: 2025-10-16T14:15:34.520
Link: CVE-2025-10611

No data.

No data.