This functionality is restricted by default to admin users; therefore, successful exploitation requires valid credentials with administrative permissions.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3961/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3961/#solution
Workaround
No workaround given by the vendor.
Wed, 05 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 05 Nov 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper input validation in the CarbonAppUploader admin service endpoint. An authenticated attacker with appropriate privileges can upload a malicious file to a user-controlled location on the server, potentially leading to remote code execution (RCE). This functionality is restricted by default to admin users; therefore, successful exploitation requires valid credentials with administrative permissions. | |
| Title | Authenticated Arbitrary File Upload in Multiple WSO2 Products via CarbonAppUploader Admin Service Leading to Remote Code Execution | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2025-11-05T18:59:01.426Z
Reserved: 2025-04-02T15:12:12.137Z
Link: CVE-2025-3125
Updated: 2025-11-05T18:58:57.362Z
Status : Received
Published: 2025-11-05T15:15:33.953
Modified: 2025-11-05T15:15:33.953
Link: CVE-2025-3125
No data.
OpenCVE Enrichment
No data.