Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-13590
PUBLISHED
More InfoOfficial Page
Assigner-WSO2
Assigner Org ID-ed10eef1-636d-4fbe-9993-6890dfa878f8
View Known Exploited Vulnerability (KEV) details
Published At-19 Feb, 2026 | 10:05
Updated At-20 Feb, 2026 | 20:33
Rejected At-
▼CVE Numbering Authority (CNA)
Authenticated arbitrary file upload via a System REST API requiring administrator permission.

A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution. By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.

Affected Products
Vendor
WSO2 LLCWSO2
Product
WSO2 API Manager
Default Status
unaffected
Versions
Affected
  • From 4.2.0 before 4.2.0.179 (custom)
  • From 4.3.0 before 4.3.0.91 (custom)
  • From 4.4.0 before 4.4.0.55 (custom)
  • From 4.5.0 before 4.5.0.38 (custom)
  • From 4.6.0 before 4.6.0.3 (custom)

unknown

  • From 0 before 4.2.0 (custom)
Vendor
WSO2 LLCWSO2
Product
WSO2 API Control Plane
Default Status
unaffected
Versions
Affected
  • From 4.5.0 before 4.5.0.39 (custom)
  • From 4.6.0 before 4.6.0.3 (custom)

unknown

  • From 0 before 4.5.0 (custom)
Vendor
WSO2 LLCWSO2
Product
WSO2 Universal Gateway
Default Status
unaffected
Versions
Affected
  • From 4.5.0 before 4.5.0.37 (custom)
  • From 4.6.0 before 4.6.0.3 (custom)

unknown

  • From 0 before 4.5.0 (custom)
Vendor
WSO2 LLCWSO2
Product
WSO2 Traffic Manager
Default Status
unaffected
Versions
Affected
  • From 4.5.0 before 4.5.0.37 (custom)
  • From 4.6.0 before 4.6.0.3 (custom)

unknown

  • From 0 before 4.5.0 (custom)
Vendor
WSO2 LLCWSO2
Product
org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.impl
Package Name
org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.impl
Default Status
unknown
Versions
Affected
  • From 9.28.116 before 9.28.116.391 (custom)
  • From 9.29.120 before 9.29.120.210 (custom)
  • From 9.30.67 before 9.30.67.133 (custom)
  • From 9.31.86 before 9.31.86.100 (custom)
  • From 9.32.147 before 9.32.147.2 (custom)
Unaffected
  • From x through * (custom)
Metrics
VersionBase scoreBase severityVector
3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2026/WSO2-2025-4849/#solution

Configurations

Workarounds

Exploits

Credits

finder
Thilan Dissanayaka
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2026/WSO2-2025-4849/
vendor-advisory
Hyperlink: https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2026/WSO2-2025-4849/
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-434CWE-434 Unrestricted Upload of File with Dangerous Type
Type: CWE
CWE ID: CWE-434
Description: CWE-434 Unrestricted Upload of File with Dangerous Type
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found