By default, access to these scripting engines is limited to administrators in WSO2 Micro Integrator and WSO2 Enterprise Integrator, while in WSO2 API Manager, access extends to both administrators and API creators. This may allow trusted-but-privileged users to perform unauthorized actions or compromise the execution environment.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4510/#solution
Workaround
No workaround given by the vendor.
Thu, 04 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wso2 api Control Plane
Wso2 traffic Manager Wso2 universal Gateway |
|
| CPEs | cpe:2.3:a:wso2:api_control_plane:4.5.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.0.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.1.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.2.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.3.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.4.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.5.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:enterprise_integrator:6.6.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:micro_integrator:4.0.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:micro_integrator:4.1.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:micro_integrator:4.2.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:micro_integrator:4.3.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:micro_integrator:4.4.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:traffic_manager:4.5.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:universal_gateway:4.5.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Wso2 api Control Plane
Wso2 traffic Manager Wso2 universal Gateway |
Thu, 06 Nov 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wso2
Wso2 api Manager Wso2 enterprise Integrator Wso2 micro Integrator |
|
| Vendors & Products |
Wso2
Wso2 api Manager Wso2 enterprise Integrator Wso2 micro Integrator |
Wed, 05 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 05 Nov 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An arbitrary code execution vulnerability exists in multiple WSO2 products due to insufficient restrictions in the GraalJS and NashornJS Script Mediator engines. Authenticated users with elevated privileges can execute arbitrary code within the integration runtime environment. By default, access to these scripting engines is limited to administrators in WSO2 Micro Integrator and WSO2 Enterprise Integrator, while in WSO2 API Manager, access extends to both administrators and API creators. This may allow trusted-but-privileged users to perform unauthorized actions or compromise the execution environment. | |
| Title | Arbitrary Code Execution with higher privileged users in Multiple WSO2 Products via Script Mediator Engines (GraalJS and NashornJS) | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2025-11-05T19:39:15.696Z
Reserved: 2025-09-27T07:10:05.485Z
Link: CVE-2025-11093
Updated: 2025-11-05T19:18:22.245Z
Status : Analyzed
Published: 2025-11-05T19:15:49.900
Modified: 2025-12-04T21:09:03.600
Link: CVE-2025-11093
No data.
OpenCVE Enrichment
Updated: 2025-11-06T10:06:47Z