Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.wso2.carbon.apimgt/org.wso2.carbon.apimgt.impl
  4. ›
  5. CVE-2025-13590

CVE-2025-13590: carbon-apimgt does not properly restrict uploaded files

February 19, 2026

A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution.

By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.

References

  • github.com/advisories/GHSA-p6jf-79j3-33f3
  • github.com/wso2/carbon-apimgt
  • github.com/wso2/carbon-apimgt/commit/49a6427b39a5d9552ce97430858bb4b1912a3044
  • github.com/wso2/carbon-apimgt/pull/13560
  • github.com/wso2/carbon-apimgt/releases/tag/v9.32.167
  • nvd.nist.gov/vuln/detail/CVE-2025-13590
  • security.docs.wso2.com/en/latest/security-announcements/security-advisories/2026/WSO2-2025-4849

Code Behaviors & Features

Detect and mitigate CVE-2025-13590 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 9.32.167

Fixed versions

  • 9.32.167

Solution

Upgrade to version 9.32.167 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-434: Unrestricted Upload of File with Dangerous Type

Source file

maven/org.wso2.carbon.apimgt/org.wso2.carbon.apimgt.impl/CVE-2025-13590.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 25 Mar 2026 00:16:35 +0000.