An authenticated remote code execution (RCE) vulnerability exists in multiple WSO2 products due to improper input validation in the event processor admin service. A user with administrative access to the SOAP admin services can exploit this flaw by deploying a Siddhi execution plan containing malicious Java code, resulting in arbitrary code execution on the server.
Exploitation of this vulnerability requires a valid user account with administrative privileges, limiting the attack surface to authenticated but potentially malicious users.
| Software | From | Fixed in |
|---|---|---|
| wso2 / api_control_plane | 4.5.0 | 4.5.0.x |
| wso2 / api_manager | 3.0.0 | 3.0.0.x |
| wso2 / api_manager | 3.1.0 | 3.1.0.x |
| wso2 / api_manager | 3.2.0 | 3.2.0.x |
| wso2 / api_manager | 3.2.1 | 3.2.1.x |
| wso2 / api_manager | 4.0.0 | 4.0.0.x |
| wso2 / api_manager | 4.1.0 | 4.1.0.x |
| wso2 / api_manager | 4.2.0 | 4.2.0.x |
| wso2 / api_manager | 4.3.0 | 4.3.0.x |
| wso2 / api_manager | 4.4.0 | 4.4.0.x |
| wso2 / api_manager | 4.5.0 | 4.5.0.x |
| wso2 / open_banking_am | 2.0.0 | 2.0.0.x |
| wso2 / traffic_manager | 4.5.0 | 4.5.0.x |