Description

An arbitrary code execution vulnerability exists in multiple WSO2 products due to insufficient restrictions in the GraalJS and NashornJS Script Mediator engines. Authenticated users with elevated privileges can execute arbitrary code within the integration runtime environment. By default, access to these scripting engines is limited to administrators in WSO2 Micro Integrator and WSO2 Enterprise Integrator, while in WSO2 API Manager, access extends to both administrators and API creators. This may allow trusted-but-privileged users to perform unauthorized actions or compromise the execution environment.

INFO

Published Date :

2025-11-05T18:31:17.873Z

Last Modified :

2025-11-05T19:39:15.696Z

Source :

WSO2
AFFECTED PRODUCTS

The following products are affected by CVE-2025-11093 vulnerability.

Vendors Products
Wso2
  • Api Control Plane
  • Api Manager
  • Enterprise Integrator
  • Micro Integrator
  • Traffic Manager
  • Universal Gateway
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-11093.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact