A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution.
By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-434 | |
| Metrics |
ssvc
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wso2 org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.impl
Wso2 wso2 Api Control Plane Wso2 wso2 Api Manager Wso2 wso2 Traffic Manager Wso2 wso2 Universal Gateway |
|
| Vendors & Products |
Wso2 org.wso2.carbon.apimgt:org.wso2.carbon.apimgt.impl
Wso2 wso2 Api Control Plane Wso2 wso2 Api Manager Wso2 wso2 Traffic Manager Wso2 wso2 Universal Gateway |
Thu, 19 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wso2
Wso2 api Control Plane Wso2 api Manager Wso2 traffic Manager Wso2 universal Gateway |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:wso2:api_control_plane:4.5.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_control_plane:4.6.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.2.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.3.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.4.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.5.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:api_manager:4.6.0:-:*:*:*:*:*:* cpe:2.3:a:wso2:traffic_manager:4.5.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:traffic_manager:4.6.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:universal_gateway:4.5.0:*:*:*:*:*:*:* cpe:2.3:a:wso2:universal_gateway:4.6.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Wso2
Wso2 api Control Plane Wso2 api Manager Wso2 traffic Manager Wso2 universal Gateway |
Thu, 19 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution. By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload. | |
| Title | Authenticated arbitrary file upload via a System REST API requiring administrator permission. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: WSO2
Published: 2026-02-19T10:05:06.083Z
Updated: 2026-02-20T20:33:02.933Z
Reserved: 2025-11-24T05:01:57.688Z
Link: CVE-2025-13590
Updated: 2026-02-20T20:32:50.706Z
Status : Modified
Published: 2026-02-19T10:16:11.003
Modified: 2026-02-20T21:19:23.787
Link: CVE-2025-13590
No data.