Description

A Cross-Site Request Forgery (CSRF) vulnerability exists in multiple WSO2 products due to the use of the HTTP GET method for state-changing operations within admin services, specifically in the event processor of the Carbon console. Although the SameSite=Lax cookie attribute is used as a mitigation, it is ineffective in this context because it allows cookies to be sent with cross-origin top-level navigations using GET requests. A malicious actor can exploit this vulnerability by tricking an authenticated user into visiting a crafted link, leading the browser to issue unintended state-changing requests. Successful exploitation could result in unauthorized operations such as data modification, account changes, or other administrative actions. According to WSO2 Secure Production Guidelines, exposure of Carbon console services to untrusted networks is discouraged, which may reduce the impact in properly secured deployments.

INFO

Published Date :

2025-11-18T11:28:37.410Z

Last Modified :

2025-11-18T19:12:59.786Z

Source :

WSO2
AFFECTED PRODUCTS

The following products are affected by CVE-2025-6670 vulnerability.

Vendors Products
Wso2
  • Api Control Plane
  • Api Manager
  • Enterprise Integrator
  • Identity Server
  • Identity Server As Key Manager
  • Open Banking Am
  • Open Banking Iam
  • Org.wso2.carbon Org.wso2.carbon.ui
  • Traffic Manager
  • Universal Gateway
  • Wso2 Api Control Plane
  • Wso2 Api Manager
  • Wso2 Enterprise Integrator
  • Wso2 Identity Server
  • Wso2 Identity Server As Key Manager
  • Wso2 Open Banking Am
  • Wso2 Open Banking Iam
  • Wso2 Traffic Manager
  • Wso2 Universal Gateway
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-6670.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact