By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Wso2
Subscribe
|
Api Control Plane
Subscribe
Api Manager
Subscribe
Org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.impl
Subscribe
Org.wso2.carbon.apimgt Org.wso2.carbon.apimgt.impl
Subscribe
Traffic Manager
Subscribe
Universal Gateway
Subscribe
Wso2 Api Control Plane
Subscribe
Wso2 Api Manager
Subscribe
Wso2 Traffic Manager
Subscribe
Wso2 Universal Gateway
Subscribe
|
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p6jf-79j3-33f3 | carbon-apimgt does not properly restrict uploaded files |
Solution
Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2026/WSO2-2025-4849/#solution
Workaround
No workaround given by the vendor.
Fri, 06 Mar 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wso2 org.wso2.carbon.apimgt Org.wso2.carbon.apimgt.impl
|
|
| CPEs | cpe:2.3:a:wso2:org.wso2.carbon.apimgt_org.wso2.carbon.apimgt.impl:*:*:*:*:*:*:*:* cpe:2.3:a:wso2:wso2_api_control_plane:*:*:*:*:*:*:*:* cpe:2.3:a:wso2:wso2_api_manager:*:*:*:*:*:*:*:* cpe:2.3:a:wso2:wso2_traffic_manager:*:*:*:*:*:*:*:* cpe:2.3:a:wso2:wso2_universal_gateway:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Wso2 org.wso2.carbon.apimgt Org.wso2.carbon.apimgt.impl
|
Fri, 20 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-434 | |
| Metrics |
ssvc
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wso2 org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.impl
Wso2 wso2 Api Control Plane Wso2 wso2 Api Manager Wso2 wso2 Traffic Manager Wso2 wso2 Universal Gateway |
|
| Vendors & Products |
Wso2 org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.impl
Wso2 wso2 Api Control Plane Wso2 wso2 Api Manager Wso2 wso2 Traffic Manager Wso2 wso2 Universal Gateway |
Thu, 19 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wso2
Wso2 api Control Plane Wso2 api Manager Wso2 traffic Manager Wso2 universal Gateway |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:wso2:api_control_plane:4.5.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_control_plane:4.6.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.2.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.3.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.4.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.5.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.6.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:traffic_manager:4.5.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:traffic_manager:4.6.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:universal_gateway:4.5.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:universal_gateway:4.6.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Wso2
Wso2 api Control Plane Wso2 api Manager Wso2 traffic Manager Wso2 universal Gateway |
Thu, 19 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution. By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload. | |
| Title | Authenticated arbitrary file upload via a System REST API requiring administrator permission. | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2026-03-06T05:44:33.953Z
Reserved: 2025-11-24T05:01:57.688Z
Link: CVE-2025-13590
Updated: 2026-02-20T20:32:50.706Z
Status : Modified
Published: 2026-02-19T10:16:11.003
Modified: 2026-02-20T21:19:23.787
Link: CVE-2025-13590
No data.
OpenCVE Enrichment
Updated: 2026-02-20T10:07:19Z
Github GHSA