Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2h9p-q5rr-fvrp

Опубликовано: 23 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.7

Описание

An authenticated remote code execution (RCE) vulnerability exists in multiple WSO2 products due to improper input validation in the event processor admin service. A user with administrative access to the SOAP admin services can exploit this flaw by deploying a Siddhi execution plan containing malicious Java code, resulting in arbitrary code execution on the server.

Exploitation of this vulnerability requires a valid user account with administrative privileges, limiting the attack surface to authenticated but potentially malicious users.

An authenticated remote code execution (RCE) vulnerability exists in multiple WSO2 products due to improper input validation in the event processor admin service. A user with administrative access to the SOAP admin services can exploit this flaw by deploying a Siddhi execution plan containing malicious Java code, resulting in arbitrary code execution on the server.

Exploitation of this vulnerability requires a valid user account with administrative privileges, limiting the attack surface to authenticated but potentially malicious users.

EPSS

Процентиль: 70%
0.00631
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 6.8
nvd
5 месяцев назад

An authenticated remote code execution (RCE) vulnerability exists in multiple WSO2 products due to improper input validation in the event processor admin service. A user with administrative access to the SOAP admin services can exploit this flaw by deploying a Siddhi execution plan containing malicious Java code, resulting in arbitrary code execution on the server. Exploitation of this vulnerability requires a valid user account with administrative privileges, limiting the attack surface to authenticated but potentially malicious users.

EPSS

Процентиль: 70%
0.00631
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-94