An arbitrary code execution vulnerability exists in multiple WSO2 products due to insufficient restrictions in the GraalJS and NashornJS Script Mediator engines. Authenticated users with elevated privileges can execute arbitrary code within the integration runtime environment.

By default, access to these scripting engines is limited to administrators in WSO2 Micro Integrator and WSO2 Enterprise Integrator, while in WSO2 API Manager, access extends to both administrators and API creators. This may allow trusted-but-privileged users to perform unauthorized actions or compromise the execution environment.
Advisories

No advisories yet.

Fixes

Solution

Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4510/#solution


Workaround

No workaround given by the vendor.

History

Thu, 04 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Wso2 api Control Plane
Wso2 traffic Manager
Wso2 universal Gateway
CPEs cpe:2.3:a:wso2:api_control_plane:4.5.0:-:*:*:*:*:*:*
cpe:2.3:a:wso2:api_manager:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:wso2:api_manager:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:wso2:api_manager:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:wso2:api_manager:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:wso2:api_manager:4.1.0:-:*:*:*:*:*:*
cpe:2.3:a:wso2:api_manager:4.2.0:-:*:*:*:*:*:*
cpe:2.3:a:wso2:api_manager:4.3.0:-:*:*:*:*:*:*
cpe:2.3:a:wso2:api_manager:4.4.0:-:*:*:*:*:*:*
cpe:2.3:a:wso2:api_manager:4.5.0:-:*:*:*:*:*:*
cpe:2.3:a:wso2:enterprise_integrator:6.6.0:*:*:*:*:*:*:*
cpe:2.3:a:wso2:micro_integrator:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:wso2:micro_integrator:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:wso2:micro_integrator:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:wso2:micro_integrator:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:wso2:micro_integrator:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:wso2:traffic_manager:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:wso2:universal_gateway:4.5.0:*:*:*:*:*:*:*
Vendors & Products Wso2 api Control Plane
Wso2 traffic Manager
Wso2 universal Gateway

Thu, 06 Nov 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Wso2
Wso2 api Manager
Wso2 enterprise Integrator
Wso2 micro Integrator
Vendors & Products Wso2
Wso2 api Manager
Wso2 enterprise Integrator
Wso2 micro Integrator

Wed, 05 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 05 Nov 2025 18:45:00 +0000

Type Values Removed Values Added
Description An arbitrary code execution vulnerability exists in multiple WSO2 products due to insufficient restrictions in the GraalJS and NashornJS Script Mediator engines. Authenticated users with elevated privileges can execute arbitrary code within the integration runtime environment. By default, access to these scripting engines is limited to administrators in WSO2 Micro Integrator and WSO2 Enterprise Integrator, while in WSO2 API Manager, access extends to both administrators and API creators. This may allow trusted-but-privileged users to perform unauthorized actions or compromise the execution environment.
Title Arbitrary Code Execution with higher privileged users in Multiple WSO2 Products via Script Mediator Engines (GraalJS and NashornJS)
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: WSO2

Published:

Updated: 2025-11-05T19:39:15.696Z

Reserved: 2025-09-27T07:10:05.485Z

Link: CVE-2025-11093

cve-icon Vulnrichment

Updated: 2025-11-05T19:18:22.245Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-05T19:15:49.900

Modified: 2025-12-04T21:09:03.600

Link: CVE-2025-11093

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-06T10:06:47Z

Weaknesses