A privilege escalation vulnerability exists in multiple [Vendor Name] products due to a business logic flaw in SOAP admin services. A malicious actor can create a new user with elevated permissions only when all of the following conditions are met:
* SOAP admin services are accessible to the attacker.
* The deployment includes an internally used attribute that is not part of the default WSO2 product configuration.
* At least one custom role exists with non-default permissions.
* The attacker has knowledge of the custom role and the internal attribute used in the deployment.
Exploiting this vulnerability allows malicious actors to assign higher privileges to self-registered users, bypassing intended access control mechanisms.
Metrics
Affected Vendors & Products
References
History
Fri, 30 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 30 May 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A privilege escalation vulnerability exists in multiple [Vendor Name] products due to a business logic flaw in SOAP admin services. A malicious actor can create a new user with elevated permissions only when all of the following conditions are met: * SOAP admin services are accessible to the attacker. * The deployment includes an internally used attribute that is not part of the default WSO2 product configuration. * At least one custom role exists with non-default permissions. * The attacker has knowledge of the custom role and the internal attribute used in the deployment. Exploiting this vulnerability allows malicious actors to assign higher privileges to self-registered users, bypassing intended access control mechanisms. | |
Title | Privilege Escalation in Multiple WSO2 Products via SOAP Admin Service Due to Business Logic Flaw | |
Weaknesses | CWE-863 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: WSO2
Published: 2025-05-30T14:54:32.417Z
Updated: 2025-05-30T15:01:40.977Z
Reserved: 2024-07-25T06:35:14.323Z
Link: CVE-2024-7096

Updated: 2025-05-30T15:01:27.920Z

Status : Awaiting Analysis
Published: 2025-05-30T15:15:40.063
Modified: 2025-05-30T16:31:03.107
Link: CVE-2024-7096

No data.