Due to the improper configuration of XML parser, user-supplied XML is parsed without applying sufficient restrictions, enabling XML External Entity (XXE) resolution in multiple WSO2 Products. A successful XXE attack could allow a remote, unauthenticated attacker to: * Read sensitive files from the server’s filesystem. * Perform denial-of-service (DoS) attacks, which can render the affected service unavailable.
History

Thu, 16 Oct 2025 11:45:00 +0000

Type Values Removed Values Added
Description An XML External Entity (XXE) vulnerability exists in the gateway component of WSO2 API Manager due to insufficient validation of XML input in crafted URL paths. User-supplied XML is parsed without appropriate restrictions, enabling external entity resolution. This vulnerability can be exploited by an unauthenticated remote attacker to read files from the server’s filesystem or perform denial-of-service (DoS) attacks. * On systems running JDK 7 or early JDK 8, full file contents may be exposed. * On later versions of JDK 8 and newer, only the first line of a file may be read, due to improvements in XML parser behavior. * DoS attacks such as "Billion Laughs" payloads can cause service disruption. Due to the improper configuration of XML parser, user-supplied XML is parsed without applying sufficient restrictions, enabling XML External Entity (XXE) resolution in multiple WSO2 Products. A successful XXE attack could allow a remote, unauthenticated attacker to: * Read sensitive files from the server’s filesystem. * Perform denial-of-service (DoS) attacks, which can render the affected service unavailable.
Title Unauthenticated XML External Entity (XXE) Vulnerability in WSO2 API Manager Gateway Component An XML External Entity (XXE) vulnerability in Multiple WSO2 Products

Thu, 02 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:*

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00082}

epss

{'score': 0.00086}


Mon, 05 May 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 05 May 2025 09:15:00 +0000

Type Values Removed Values Added
Description An XML External Entity (XXE) vulnerability exists in the gateway component of WSO2 API Manager due to insufficient validation of XML input in crafted URL paths. User-supplied XML is parsed without appropriate restrictions, enabling external entity resolution. This vulnerability can be exploited by an unauthenticated remote attacker to read files from the server’s filesystem or perform denial-of-service (DoS) attacks. * On systems running JDK 7 or early JDK 8, full file contents may be exposed. * On later versions of JDK 8 and newer, only the first line of a file may be read, due to improvements in XML parser behavior. * DoS attacks such as "Billion Laughs" payloads can cause service disruption.
Title Unauthenticated XML External Entity (XXE) Vulnerability in WSO2 API Manager Gateway Component
Weaknesses CWE-611
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: WSO2

Published:

Updated: 2025-10-16T11:39:21.741Z

Reserved: 2025-03-28T08:46:09.062Z

Link: CVE-2025-2905

cve-icon Vulnrichment

Updated: 2025-05-05T12:44:38.267Z

cve-icon NVD

Status : Modified

Published: 2025-05-05T09:15:15.923

Modified: 2025-10-16T12:15:47.167

Link: CVE-2025-2905

cve-icon Redhat

No data.