Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7f34-p2r4-j656

Опубликовано: 02 июн. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.8

Описание

An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server.

By leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users.

An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server.

By leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users.

EPSS

Процентиль: 38%
0.00171
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 6.8
nvd
8 месяцев назад

An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server. By leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users.

EPSS

Процентиль: 38%
0.00171
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-434