An incorrect authorization vulnerability exists in multiple WSO2 products that allows unauthorized access to versioned files stored in the registry. Due to flawed authorization logic, a malicious actor with access to the management console can exploit a specific bypass method to retrieve versioned files without proper authorization.
Successful exploitation of this vulnerability could lead to unauthorized disclosure of configuration or resource files that may be stored as registry versions, potentially aiding further attacks or system reconnaissance.
Metrics
Affected Vendors & Products
References
History
Mon, 23 Jun 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 23 Jun 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An incorrect authorization vulnerability exists in multiple WSO2 products that allows unauthorized access to versioned files stored in the registry. Due to flawed authorization logic, a malicious actor with access to the management console can exploit a specific bypass method to retrieve versioned files without proper authorization. Successful exploitation of this vulnerability could lead to unauthorized disclosure of configuration or resource files that may be stored as registry versions, potentially aiding further attacks or system reconnaissance. | |
Title | Incorrect Authorization in Multiple WSO2 Products Allows Unauthorized Access to Registry Versioned Files | |
Weaknesses | CWE-863 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: WSO2
Published: 2025-06-23T08:47:55.266Z
Updated: 2025-06-23T12:43:45.452Z
Reserved: 2024-04-09T12:08:02.707Z
Link: CVE-2024-3511

Updated: 2025-06-23T12:43:40.765Z

Status : Awaiting Analysis
Published: 2025-06-23T09:15:21.580
Modified: 2025-06-23T20:16:21.633
Link: CVE-2024-3511

No data.