Cyber Posture

CVE-2025-10907

High

Published: 05 November 2025

Published
05 November 2025
Modified
04 December 2025
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0041 61.4th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may backdoor web servers with web shells to establish persistent access to systems.

Security Summary

CVE-2025-10907 is an arbitrary file upload vulnerability affecting multiple WSO2 products, caused by insufficient validation of uploaded content and destination in SOAP admin services. Published on 2025-11-05, it allows a malicious actor with administrative privileges to upload a specially crafted file to a user-controlled location within the deployment. The issue is classified under CWE-434 and carries a CVSS v3.1 base score of 8.4 (AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Exploitation requires administrative access to the affected SOAP services. An attacker with such privileges can upload a malicious file, which may lead to remote code execution (RCE) on the server, depending on how the file is subsequently processed. The adjacent network access vector (AV:A) and high privileges requirement (PR:H) limit the blast radius, but successful scope change (S:C) enables high-impact confidentiality, integrity, and availability violations.

Mitigation guidance is available in the WSO2 security advisory at https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4603/.

Details

CWE(s)
CWE-434

Affected Products

wso2
api control plane
4.5.0
wso2
api manager
3.1.0, 3.2.0, 3.2.1, 4.0.0, 4.1.0
wso2
enterprise integrator
6.6.0
wso2
identity server
5.10.0, 5.11.0, 6.0.0, 6.1.0, 7.0.0
wso2
identity server as key manager
5.10.0
wso2
open banking am
2.0.0
wso2
open banking iam
2.0.0
wso2
traffic manager
4.5.0
wso2
universal gateway
4.5.0

MITRE ATT&CK Enterprise Techniques

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Arbitrary file upload in authenticated SOAP admin services enables exploitation of remote services for RCE (T1210) and facilitates web shell deployment (T1505.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References