Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-8325— Improper Access Control via Gateway API in Multiple WSO2 Products Allows Unauthorized Operations

CVSS 6.3 · Medium EPSS 0.03% · P10
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-8325

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Improper Access Control via Gateway API in Multiple WSO2 Products Allows Unauthorized Operations
Source: NVD (National Vulnerability Database)
Vulnerability Description
The software fails to enforce role-based access controls for certain Gateway API invocations. Users with the 'Internal/Everyone' role can invoke these APIs, bypassing intended permission checks. This same vulnerability also affects Internal Service APIs, potentially exposing them in WSO2 APIM 3.x versions. A malicious actor with a valid user account on a vulnerable deployment can perform sensitive operations against the Gateway REST API regardless of their actual roles or privileges. This could lead to unintended behavior or misuse, particularly in production environments.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
权限预留不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
WSO2多款产品 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WSO2 API Manager等都是美国WSO2公司的产品。WSO2 API Manager是一套API生命周期管理解决方案。WSO2 API Control Plane是一个控制面板。WSO2 Traffic Manager是一个调节和管理API流量的组件。 WSO2多款产品存在安全漏洞,该漏洞源于未能对某些Gateway API调用强制执行基于角色的访问控制,导致具有Internal/Everyone角色的用户可绕过权限检查调用这些API,同时影响Internal Service API,可能导致恶
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
WSO2WSO2 API Control Plane 4.5.0 ~ 4.5.0.18 -
WSO2WSO2 Universal Gateway 4.5.0 ~ 4.5.0.17 -
WSO2WSO2 Traffic Manager 4.5.0 ~ 4.5.0.17 -
WSO2WSO2 API Manager 3.2.0 ~ 3.2.0.435 -
WSO2WSO2 Carbon API Management Implementation 6.7.206 ~ 6.7.206.563 -
WSO2WSO2 Carbon API Manager Rest API Utility 6.7.206 ~ 6.7.206.563 -

II. Public POCs for CVE-2025-8325

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-8325

登录查看更多情报信息。

Same Patch Batch · WSO2 · 2026-05-11 · 6 CVEs total

CVE-2025-104708.6 HIGHDenial-of-Service via Magic Link Authentication in WSO2 Identity Server Allows Service Una
CVE-2025-99736.4 MEDIUMAuthorization Bypass via Adaptive Authentication in WSO2 Identity Server Allows Cross-Orga
CVE-2024-03915.3 MEDIUMUsername Enumeration via Email OTP Flow in Multiple WSO2 Products Allows User Account Disc
CVE-2025-81545.3 MEDIUMHTTP Header Injection via Webhook API in Multiple WSO2 Products Allows Response Header Man
CVE-2025-10908Account Lock Bypass via Magic Link or Pass Key Authentication in WSO2 Identity Server Allo

IV. Related Vulnerabilities

V. Comments for CVE-2025-8325

No comments yet


Leave a comment