Description

A missing authentication enforcement vulnerability exists in the mutual TLS (mTLS) implementation used by System REST APIs and SOAP services in multiple WSO2 products. Due to improper validation of client certificate–based authentication in certain default configurations, the affected components may permit unauthenticated requests even when mTLS is enabled. This condition occurs when relying on the default mTLS settings for System REST APIs or when the mTLS authenticator is enabled for SOAP services, causing these interfaces to accept requests without enforcing additional authentication. Successful exploitation allows a malicious actor with network access to the affected endpoints to gain administrative privileges and perform unauthorized operations. The vulnerability is exploitable only when the impacted mTLS flows are enabled and accessible in a given deployment. Other certificate-based authentication mechanisms such as Mutual TLS OAuth client authentication and X.509 login flows are not affected, and APIs served through the API Gateway of WSO2 API Manager remain unaffected.

INFO

Published Date :

2025-11-18T12:05:22.207Z

Last Modified :

2025-11-18T17:38:15.686Z

Source :

WSO2
AFFECTED PRODUCTS

The following products are affected by CVE-2025-9312 vulnerability.

Vendors Products
Wso2
  • Api Control Plane
  • Api Manager
  • Identity Server
  • Identity Server As Key Manager
  • Open Banking Am
  • Open Banking Iam
  • Open Banking Km
  • Org.wso2.carbon.identity.auth.service
  • Traffic Manager
  • Universal Gateway
  • Wso2 Api Control Plane
  • Wso2 Api Manager
  • Wso2 Identity Server
  • Wso2 Identity Server As Key Manager
  • Wso2 Open Banking Am
  • Wso2 Open Banking Iam
  • Wso2 Open Banking Km
  • Wso2 Traffic Manager
  • Wso2 Universal Gateway
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-9312.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact