An incorrect authorization vulnerability exists in multiple WSO2 products that allows unauthorized access to versioned files stored in the registry. Due to flawed authorization logic, a malicious actor with access to the management console can exploit a specific bypass method to retrieve versioned files without proper authorization. Successful exploitation of this vulnerability could lead to unauthorized disclosure of configuration or resource files that may be stored as registry versions, potentially aiding further attacks or system reconnaissance.
History

Mon, 23 Jun 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Jun 2025 09:00:00 +0000

Type Values Removed Values Added
Description An incorrect authorization vulnerability exists in multiple WSO2 products that allows unauthorized access to versioned files stored in the registry. Due to flawed authorization logic, a malicious actor with access to the management console can exploit a specific bypass method to retrieve versioned files without proper authorization. Successful exploitation of this vulnerability could lead to unauthorized disclosure of configuration or resource files that may be stored as registry versions, potentially aiding further attacks or system reconnaissance.
Title Incorrect Authorization in Multiple WSO2 Products Allows Unauthorized Access to Registry Versioned Files
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: WSO2

Published: 2025-06-23T08:47:55.266Z

Updated: 2025-06-23T12:43:45.452Z

Reserved: 2024-04-09T12:08:02.707Z

Link: CVE-2024-3511

cve-icon Vulnrichment

Updated: 2025-06-23T12:43:40.765Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-23T09:15:21.580

Modified: 2025-06-23T20:16:21.633

Link: CVE-2024-3511

cve-icon Redhat

No data.