All the vulnerabilites related to WSO2 - WSO2 Micro Integrator
cve-2024-7074
Vulnerability from cvelistv5
Published
2025-06-02 16:42
Modified
2025-06-02 17:05
Severity ?
EPSS score ?
Summary
Authenticated Arbitrary File Upload in Multiple WSO2 Products via SOAP Admin Service Leading to Remote Code Execution
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-7074", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-02T17:04:40.480620Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-02T17:05:49.920Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 Enterprise Integrator", "vendor": "WSO2", "versions": [ { "lessThan": "6.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "6.0.0.21", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.38", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "6.1.1.42", "status": "affected", "version": "6.1.1", "versionType": "custom" }, { "lessThan": "6.2.0.61", "status": "affected", "version": "6.2.0", "versionType": "custom" }, { "lessThan": "6.3.0.69", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "6.4.0.96", "status": "affected", "version": "6.4.0", "versionType": "custom" }, { "lessThan": "6.5.0.102", "status": "affected", "version": "6.5.0", "versionType": "custom" }, { "lessThan": "6.6.0.198", "status": "affected", "version": "6.6.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.28", "status": "affected", "version": "2.0.0", "versionType": "custom" }, { "lessThan": "2.1.0.38", "status": "affected", "version": "2.1.0", "versionType": "custom" }, { "lessThan": "2.2.0.57", "status": "affected", "version": "2.2.0", "versionType": "custom" }, { "lessThan": "2.5.0.83", "status": "affected", "version": "2.5.0", "versionType": "custom" }, { "lessThan": "2.6.0.143", "status": "affected", "version": "2.6.0", "versionType": "custom" }, { "lessThan": "3.0.0.162", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThan": "3.1.0.293", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.2.0.384", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.16", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.0.0.305", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.166", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.100", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.16", "status": "affected", "version": "4.3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "WSO2 Enterprise Service Bus", "vendor": "WSO2", "versions": [ { "lessThan": "4.9.0.10", "status": "affected", "version": "4.9.0", "versionType": "custom" }, { "lessThan": "5.0.0.28", "status": "affected", "version": "5.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "WSO2 Enterprise Mobility Manager", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.27", "status": "affected", "version": "2.2.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Micro Integrator", "vendor": "WSO2", "versions": [ { "lessThan": "1.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.0.0.49", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking AM", "vendor": "WSO2", "versions": [ { "lessThan": "1.3.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.3.0.132", "status": "affected", "version": "1.3.0", "versionType": "custom" }, { "lessThan": "1.4.0.135", "status": "affected", "version": "1.4.0", "versionType": "custom" }, { "lessThan": "1.5.0.137", "status": "affected", "version": "1.5.0", "versionType": "custom" }, { "lessThan": "2.0.0.342", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "packageName": "org.wso2.carbon.mediation:org.wso2.carbon.mediation.artifactuploader", "product": "WSO2 Carbon Synapse Artifact Uploader BE", "vendor": "WSO2", "versions": [ { "lessThan": "4.4.10.3", "status": "affected", "version": "4.4.10", "versionType": "custom" }, { "lessThan": "4.6.1.4", "status": "affected", "version": "4.6.1", "versionType": "custom" }, { "lessThan": "4.6.6.9", "status": "affected", "version": "4.6.6", "versionType": "custom" }, { "lessThan": "4.6.10.4", "status": "affected", "version": "4.6.10", "versionType": "custom" }, { "lessThan": "4.6.16.2", "status": "affected", "version": "4.6.16", "versionType": "custom" }, { "lessThan": "4.6.19.10", "status": "affected", "version": "4.6.19", "versionType": "custom" }, { "lessThan": "4.6.64.2", "status": "affected", "version": "4.6.64", "versionType": "custom" }, { "lessThan": "4.6.67.15", "status": "affected", "version": "4.6.67", "versionType": "custom" }, { "lessThan": "4.6.89.12", "status": "affected", "version": "4.6.89", "versionType": "custom" }, { "lessThan": "4.6.105.59", "status": "affected", "version": "4.6.105", "versionType": "custom" }, { "lessThan": "4.6.150.11", "status": "affected", "version": "4.6.150", "versionType": "custom" }, { "lessThan": "4.7.20.5", "status": "affected", "version": "4.7.20", "versionType": "custom" }, { "lessThan": "4.7.30.42", "status": "affected", "version": "4.7.30", "versionType": "custom" }, { "lessThan": "4.7.35.5", "status": "affected", "version": "4.7.35", "versionType": "custom" }, { "lessThan": "4.7.61.56", "status": "affected", "version": "4.7.61", "versionType": "custom" }, { "lessThan": "4.7.99.299", "status": "affected", "version": "4.7.99", "versionType": "custom" }, { "lessThan": "4.7.131.15", "status": "affected", "version": "4.7.131", "versionType": "custom" }, { "lessThan": "4.7.175.18", "status": "affected", "version": "4.7.175", "versionType": "custom" }, { "lessThan": "4.7.188.5", "status": "affected", "version": "4.7.188", "versionType": "custom" }, { "lessThan": "4.7.204.5", "status": "affected", "version": "4.7.204", "versionType": "custom" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "4.7.216", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Anonymous working with Trend Micro Zero Day Initiative" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server.\u003cbr\u003e\u003cbr\u003eBy leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users.\u003cbr\u003e" } ], "value": "An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server.\n\nBy leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-02T16:42:19.264Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3566/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Follow the instructions given on \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3566/#solution\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3...\u003c/a\u003e \u003cbr\u003e\u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3566/#solution" } ], "source": { "advisory": "WSO2-2024-3566", "discovery": "EXTERNAL" }, "title": "Authenticated Arbitrary File Upload in Multiple WSO2 Products via SOAP Admin Service Leading to Remote Code Execution", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-7074", "datePublished": "2025-06-02T16:42:19.264Z", "dateReserved": "2024-07-24T12:15:52.796Z", "dateUpdated": "2025-06-02T17:05:49.920Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6836
Vulnerability from cvelistv5
Published
2023-12-15 09:26
Modified
2024-08-02 08:42
Severity ?
EPSS score ?
Summary
Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:08.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager ", "repo": "https://github.com/wso2/product-apim", "vendor": "WSO2", "versions": [ { "lessThan": "3.0.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.0.0.1", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Manager Analytics", "repo": "https://github.com/wso2/analytics-apim", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.2.0.1", "status": "affected", "version": "2.2.0.0", "versionType": "custom" }, { "lessThan": "2.5.0.1", "status": "affected", "version": "2.5.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Microgateway", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.2.0.1", "status": "affected", "version": "2.2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Enterprise Integrator", "repo": "https://github.com/wso2/product-ei", "vendor": "WSO2", "versions": [ { "lessThan": "6.0.0.2", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "6.0.0.3", "status": "affected", "version": "6.0.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.5", "status": "affected", "version": "6.1.0.0", "versionType": "custom" }, { "lessThan": "6.1.1.5", "status": "affected", "version": "6.1.1.0", "versionType": "custom" }, { "lessThan": "6.6.0.1", "status": "affected", "version": "6.6.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 IS as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.5.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.5.0.1", "status": "affected", "version": "5.5.0.0", "versionType": "custom" }, { "lessThan": "5.6.0.1", "status": "affected", "version": "5.6.0.0", "versionType": "custom" }, { "lessThan": "5.7.0.1", "status": "affected", "version": "5.7.0.0", "versionType": "custom" }, { "lessThan": "5.9.0.1", "status": "affected", "version": "5.9.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "repo": "https://github.com/wso2/product-is", "vendor": "WSO2", "versions": [ { "lessThan": "5.4.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.4.0.1", "status": "affected", "version": "5.4.0.0", "versionType": "custom" }, { "lessThan": "5.4.1.1", "status": "affected", "version": "5.4.1.0", "versionType": "custom" }, { "lessThan": "5.5.0.1", "status": "affected", "version": "5.5.0.0", "versionType": "custom" }, { "lessThan": "5.6.0.1", "status": "affected", "version": "5.6.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Micro Integrator", "vendor": "WSO2", "versions": [ { "lessThan": "1.0.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.0.0.1", "status": "affected", "version": "1.0.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information." } ], "value": "Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information." } ], "impacts": [ { "capecId": "CAPEC-250", "descriptions": [ { "lang": "en", "value": "CAPEC-250 XML Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-09T05:03:32.570Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\u003cbr\u003e\u003cbr\u003eCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/\u003c/a\u003e\u003cbr\u003e" } ], "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/ https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/ \n" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2023-6836", "datePublished": "2023-12-15T09:26:01.323Z", "dateReserved": "2023-12-15T09:25:13.205Z", "dateUpdated": "2024-08-02T08:42:08.180Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-4598
Vulnerability from cvelistv5
Published
2025-09-23 10:39
Modified
2025-09-23 19:35
Severity ?
EPSS score ?
Summary
Information Disclosure in Multiple WSO2 Products Due to Improper Handling in Enrich Mediator
References
Impacted products
▼ | Vendor | Product |
---|---|---|
WSO2 | WSO2 API Manager | |
WSO2 | WSO2 Micro Integrator |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-4598", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-23T19:35:13.107728Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1259", "description": "CWE-1259 Improper Restriction of Security Token Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-23T19:35:33.987Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "3.2.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.2.0.422", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.42", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.1.0.152", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.3.0.55", "status": "affected", "version": "4.3.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Micro Integrator", "vendor": "WSO2", "versions": [ { "lessThan": "1.2.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.2.0.157", "status": "affected", "version": "1.2.0", "versionType": "custom" }, { "lessThan": "4.1.0.95", "status": "affected", "version": "4.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An information disclosure vulnerability exists in multiple WSO2 products due to improper implementation of the enrich mediator. Authenticated users may be able to view unintended business data from other mediation contexts because the internal state is not properly isolated or cleared between executions.\u003cbr\u003e\u003cbr\u003eThis vulnerability does not impact user credentials or access tokens but may lead to leakage of sensitive business information handled during message flows." } ], "value": "An information disclosure vulnerability exists in multiple WSO2 products due to improper implementation of the enrich mediator. Authenticated users may be able to view unintended business data from other mediation contexts because the internal state is not properly isolated or cleared between executions.\n\nThis vulnerability does not impact user credentials or access tokens but may lead to leakage of sensitive business information handled during message flows." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-23T10:39:16.195Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3355/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3355/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3355/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3355/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3355/#solution" } ], "source": { "advisory": "WSO2-2024-3355", "discovery": "INTERNAL" }, "title": "Information Disclosure in Multiple WSO2 Products Due to Improper Handling in Enrich Mediator", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-4598", "datePublished": "2025-09-23T10:39:16.195Z", "dateReserved": "2024-05-07T06:40:12.013Z", "dateUpdated": "2025-09-23T19:35:33.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }