Successful exploitation of this vulnerability could lead to a malicious actor gaining administrative access and performing unauthenticated and unauthorized administrative operations.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4585/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4585/#solution
Workaround
No workaround given by the vendor.
Thu, 16 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-863 | |
Metrics |
ssvc
|
Thu, 16 Oct 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to an insufficient access control implementation in multiple WSO2 Products, authentication and authorization checks for certain REST APIs can be bypassed, allowing them to be invoked without proper validation. Successful exploitation of this vulnerability could lead to a malicious actor gaining administrative access and performing unauthenticated and unauthorized administrative operations. | |
Title | Potential Broken Access Control in Multiple WSO2 Products via System REST APIs | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2025-10-16T13:34:31.799Z
Reserved: 2025-09-17T08:56:27.794Z
Link: CVE-2025-10611

Updated: 2025-10-16T13:24:43.729Z

Status : Awaiting Analysis
Published: 2025-10-16T13:15:40.640
Modified: 2025-10-16T15:28:59.610
Link: CVE-2025-10611

No data.

No data.