A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution.
By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.
References
| Link | Resource |
|---|---|
| https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2026/WSO2-2025-4849/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-19 10:16
Updated : 2026-02-20 21:19
NVD link : CVE-2025-13590
Mitre link : CVE-2025-13590
CVE.ORG link : CVE-2025-13590
JSON object : View
Products Affected
wso2
- universal_gateway
- api_manager
- traffic_manager
- api_control_plane
CWE
