Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hwxg-x5fm-7m92

Опубликовано: 26 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.7

Описание

An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user-supplied filenames in the BPEL uploader SOAP service endpoint. A malicious actor with administrative privileges can upload arbitrary files to a user-controlled location on the server.

By leveraging this vulnerability, an attacker can upload a specially crafted payload and achieve remote code execution (RCE), potentially compromising the server and its data.

An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user-supplied filenames in the BPEL uploader SOAP service endpoint. A malicious actor with administrative privileges can upload arbitrary files to a user-controlled location on the server.

By leveraging this vulnerability, an attacker can upload a specially crafted payload and achieve remote code execution (RCE), potentially compromising the server and its data.

EPSS

Процентиль: 61%
0.00408
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 6.7
nvd
4 месяца назад

An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user-supplied filenames in the BPEL uploader SOAP service endpoint. A malicious actor with administrative privileges can upload arbitrary files to a user-controlled location on the server. By leveraging this vulnerability, an attacker can upload a specially crafted payload and achieve remote code execution (RCE), potentially compromising the server and its data.

EPSS

Процентиль: 61%
0.00408
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-434