CVE-2025-9312

Dec. 8, 2025, 2:01 p.m.

9.8
Critical

Description

A missing authentication enforcement vulnerability exists in the mutual TLS (mTLS) implementation used by System REST APIs and SOAP services in multiple WSO2 products. Due to improper validation of client certificate–based authentication in certain default configurations, the affected components may permit unauthenticated requests even when mTLS is enabled. This condition occurs when relying on the default mTLS settings for System REST APIs or when the mTLS authenticator is enabled for SOAP services, causing these interfaces to accept requests without enforcing additional authentication. Successful exploitation allows a malicious actor with network access to the affected endpoints to gain administrative privileges and perform unauthorized operations. The vulnerability is exploitable only when the impacted mTLS flows are enabled and accessible in a given deployment. Other certificate-based authentication mechanisms such as Mutual TLS OAuth client authentication and X.509 login flows are not affected, and APIs served through the API Gateway of WSO2 API Manager remain unaffected.

Product(s) Impacted

Vendor Product Versions
Wso2
  • Api Control Plane
  • Api Manager
  • Identity Server
  • Identity Server As Key Manager
  • Open Banking Am
  • Open Banking Iam
  • Open Banking Km
  • Traffic Manager
  • Universal Gateway
  • 4.5.0
  • 2.2.0, 2.5.0, 2.6.0, 3.0.0, 3.1.0, 3.2.0, 3.2.1, 4.0.0, 4.1.0, 4.2.0, 4.3.0, 4.4.0, 4.5.0
  • 5.2.0, 5.3.0, 5.4.0, 5.4.1, 5.5.0, 5.6.0, 5.7.0, 5.8.0, 5.9.0, 5.10.0, 5.11.0, 6.0.0, 6.1.0, 7.0.0, 7.1.0, 7.2.0
  • 5.3.0, 5.5.0, 5.6.0, 5.7.0, 5.9.0, 5.10.0
  • 1.4.0, 1.5.0, 2.0.0
  • 2.0.0
  • 1.4.0, 1.5.0
  • 4.5.0
  • 4.5.0

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-306
Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a wso2 api_control_plane 4.5.0 - / / / / / /
a wso2 api_manager 2.2.0 / / / / / / /
a wso2 api_manager 2.5.0 / / / / / / /
a wso2 api_manager 2.6.0 / / / / / / /
a wso2 api_manager 3.0.0 / / / / / / /
a wso2 api_manager 3.1.0 / / / / / / /
a wso2 api_manager 3.2.0 / / / / / / /
a wso2 api_manager 3.2.1 / / / / / / /
a wso2 api_manager 4.0.0 / / / / / / /
a wso2 api_manager 4.1.0 - / / / / / /
a wso2 api_manager 4.2.0 - / / / / / /
a wso2 api_manager 4.3.0 - / / / / / /
a wso2 api_manager 4.4.0 - / / / / / /
a wso2 api_manager 4.5.0 - / / / / / /
a wso2 identity_server 5.2.0 / / / / / / /
a wso2 identity_server 5.3.0 / / / / / / /
a wso2 identity_server 5.4.0 / / / / / / /
a wso2 identity_server 5.4.1 / / / / / / /
a wso2 identity_server 5.5.0 / / / / / / /
a wso2 identity_server 5.6.0 / / / / / / /
a wso2 identity_server 5.7.0 / / / / / / /
a wso2 identity_server 5.8.0 / / / / / / /
a wso2 identity_server 5.9.0 / / / / / / /
a wso2 identity_server 5.10.0 / / / / / / /
a wso2 identity_server 5.11.0 / / / / / / /
a wso2 identity_server 6.0.0 - / / / / / /
a wso2 identity_server 6.1.0 - / / / / / /
a wso2 identity_server 7.0.0 - / / / / / /
a wso2 identity_server 7.1.0 - / / / / / /
a wso2 identity_server 7.2.0 / / / / / / /
a wso2 identity_server_as_key_manager 5.3.0 / / / / / / /
a wso2 identity_server_as_key_manager 5.5.0 / / / / / / /
a wso2 identity_server_as_key_manager 5.6.0 / / / / / / /
a wso2 identity_server_as_key_manager 5.7.0 / / / / / / /
a wso2 identity_server_as_key_manager 5.9.0 / / / / / / /
a wso2 identity_server_as_key_manager 5.10.0 / / / / / / /
a wso2 open_banking_am 1.4.0 / / / / / / /
a wso2 open_banking_am 1.5.0 / / / / / / /
a wso2 open_banking_am 2.0.0 / / / / / / /
a wso2 open_banking_iam 2.0.0 / / / / / / /
a wso2 open_banking_km 1.4.0 / / / / / / /
a wso2 open_banking_km 1.5.0 / / / / / / /
a wso2 traffic_manager 4.5.0 / / / / / / /
a wso2 universal_gateway 4.5.0 / / / / / / /

CVSS Score

9.8 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

    View Vector String

Timeline

Published: Nov. 18, 2025, 3:16 p.m.
Last Modified: Dec. 8, 2025, 2:01 p.m.

Status : Analyzed

CVE has had analysis completed and all data associations made.

More info

Source

ed10eef1-636d-4fbe-9993-6890dfa878f8

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.