CVE-2025-13590
Authenticated arbitrary file upload via a System REST API requiring administrator permission.
CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th
A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution. By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.
| Vendor | wso2 |
| Product | wso2 api manager |
| Published | Feb 19, 2026 |
| Last Updated | Mar 6, 2026 |
Stay Ahead of the Next One
Get instant alerts for wso2 wso2 api manager
Be the first to know when new critical vulnerabilities affecting wso2 wso2 api manager are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
WSO2 / WSO2 API Manager
4.2.0 < 4.2.0.179 4.3.0 < 4.3.0.91 4.4.0 < 4.4.0.55 4.5.0 < 4.5.0.38 4.6.0 < 4.6.0.3
WSO2 / WSO2 API Control Plane
4.5.0 < 4.5.0.39 4.6.0 < 4.6.0.3
WSO2 / WSO2 Universal Gateway
4.5.0 < 4.5.0.37 4.6.0 < 4.6.0.3
WSO2 / WSO2 Traffic Manager
4.5.0 < 4.5.0.37 4.6.0 < 4.6.0.3
WSO2 / org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.impl
9.28.116 < 9.28.116.391 9.29.120 < 9.29.120.210 9.30.67 < 9.30.67.133 9.31.86 < 9.31.86.100 9.32.147 < 9.32.147.2
References
Credits
Thilan Dissanayaka