By leveraging this vulnerability, an attacker can upload a specially crafted payload and achieve remote code execution (RCE), potentially compromising the server and its data.
Metrics
Affected Vendors & Products
Solution
Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3992/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3992/#solution
Workaround
No workaround given by the vendor.
Fri, 26 Sep 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user-supplied filenames in the BPEL uploader SOAP service endpoint. A malicious actor with administrative privileges can upload arbitrary files to a user-controlled location on the server. By leveraging this vulnerability, an attacker can upload a specially crafted payload and achieve remote code execution (RCE), potentially compromising the server and its data. | |
Title | Authenticated Arbitrary File Upload in Multiple WSO2 Products via BPEL Uploader SOAP Service Leading to Remote Code Execution | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2025-09-26T08:18:21.708Z
Reserved: 2025-03-03T04:53:13.295Z
Link: CVE-2025-1862

No data.

Status : Awaiting Analysis
Published: 2025-09-26T09:15:31.687
Modified: 2025-09-26T14:32:19.853
Link: CVE-2025-1862

No data.

No data.