A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution.
By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.
By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p6jf-79j3-33f3 | carbon-apimgt does not properly restrict uploaded files |
Fixes
Solution
Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2026/WSO2-2025-4849/#solution
Workaround
No workaround given by the vendor.
References
History
Thu, 19 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wso2
Wso2 api Control Plane Wso2 api Manager Wso2 traffic Manager Wso2 universal Gateway |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:wso2:api_control_plane:4.5.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_control_plane:4.6.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.2.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.3.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.4.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.5.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.6.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:traffic_manager:4.5.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:traffic_manager:4.6.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:universal_gateway:4.5.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:universal_gateway:4.6.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Wso2
Wso2 api Control Plane Wso2 api Manager Wso2 traffic Manager Wso2 universal Gateway |
Thu, 19 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution. By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload. | |
| Title | Authenticated arbitrary file upload via a System REST API requiring administrator permission. | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2026-02-19T10:05:06.083Z
Reserved: 2025-11-24T05:01:57.688Z
Link: CVE-2025-13590
No data.
Status : Analyzed
Published: 2026-02-19T10:16:11.003
Modified: 2026-02-19T19:55:32.370
Link: CVE-2025-13590
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA