A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution.

By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.

Project Subscriptions

Vendors Products
Api Control Plane Subscribe
Api Manager Subscribe
Org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.impl Subscribe
Traffic Manager Subscribe
Universal Gateway Subscribe
Wso2 Api Control Plane Subscribe
Wso2 Api Manager Subscribe
Wso2 Traffic Manager Subscribe
Wso2 Universal Gateway Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-p6jf-79j3-33f3 carbon-apimgt does not properly restrict uploaded files
Fixes

Solution

Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2026/WSO2-2025-4849/#solution


Workaround

No workaround given by the vendor.

History

Fri, 20 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-434
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Wso2 org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.impl
Wso2 wso2 Api Control Plane
Wso2 wso2 Api Manager
Wso2 wso2 Traffic Manager
Wso2 wso2 Universal Gateway
Vendors & Products Wso2 org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.impl
Wso2 wso2 Api Control Plane
Wso2 wso2 Api Manager
Wso2 wso2 Traffic Manager
Wso2 wso2 Universal Gateway

Thu, 19 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Wso2
Wso2 api Control Plane
Wso2 api Manager
Wso2 traffic Manager
Wso2 universal Gateway
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:wso2:api_control_plane:4.5.0:-:*:*:*:*:*:*
cpe:2.3:a:wso2:api_control_plane:4.6.0:-:*:*:*:*:*:*
cpe:2.3:a:wso2:api_manager:4.2.0:-:*:*:*:*:*:*
cpe:2.3:a:wso2:api_manager:4.3.0:-:*:*:*:*:*:*
cpe:2.3:a:wso2:api_manager:4.4.0:-:*:*:*:*:*:*
cpe:2.3:a:wso2:api_manager:4.5.0:-:*:*:*:*:*:*
cpe:2.3:a:wso2:api_manager:4.6.0:-:*:*:*:*:*:*
cpe:2.3:a:wso2:traffic_manager:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:wso2:traffic_manager:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:wso2:universal_gateway:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:wso2:universal_gateway:4.6.0:*:*:*:*:*:*:*
Vendors & Products Wso2
Wso2 api Control Plane
Wso2 api Manager
Wso2 traffic Manager
Wso2 universal Gateway

Thu, 19 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
Description A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution. By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.
Title Authenticated arbitrary file upload via a System REST API requiring administrator permission.
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: WSO2

Published:

Updated: 2026-02-20T20:33:02.933Z

Reserved: 2025-11-24T05:01:57.688Z

Link: CVE-2025-13590

cve-icon Vulnrichment

Updated: 2026-02-20T20:32:50.706Z

cve-icon NVD

Status : Modified

Published: 2026-02-19T10:16:11.003

Modified: 2026-02-20T21:19:23.787

Link: CVE-2025-13590

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-20T10:07:19Z

Weaknesses