CVE-2025-11093: CWE-94 Improper Control of Generation of Code ('Code Injection') in WSO2 WSO2 Micro Integrator
An arbitrary code execution vulnerability exists in multiple WSO2 products due to insufficient restrictions in the GraalJS and NashornJS Script Mediator engines. Authenticated users with elevated privileges can execute arbitrary code within the integration runtime environment. By default, access to these scripting engines is limited to administrators in WSO2 Micro Integrator and WSO2 Enterprise Integrator, while in WSO2 API Manager, access extends to both administrators and API creators. This may allow trusted-but-privileged users to perform unauthorized actions or compromise the execution environment.
AI Analysis
Technical Summary
CVE-2025-11093 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting WSO2 Micro Integrator and other WSO2 products that utilize GraalJS and NashornJS Script Mediator engines. These engines allow scripting capabilities within the integration runtime environment, but due to insufficient restrictions, authenticated users with elevated privileges can inject and execute arbitrary code. By default, access to these scripting engines is limited to administrators in WSO2 Micro Integrator and Enterprise Integrator, while in WSO2 API Manager, API creators also have access. This expanded access increases the attack surface, enabling trusted but privileged users to perform unauthorized actions, potentially leading to full system compromise. The vulnerability affects versions 4.0.0 through 4.4.0 and was published on November 5, 2025. The CVSS 3.1 base score of 8.4 reflects high severity, with attack vector requiring adjacent network access (AV:A), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (all high). No public exploits are known yet, but the potential for damage is significant given the ability to execute arbitrary code within critical integration environments. This vulnerability could be leveraged to pivot within enterprise networks, exfiltrate sensitive data, disrupt services, or deploy further malware.
Potential Impact
For European organizations, the impact of CVE-2025-11093 is substantial due to the widespread use of WSO2 integration products in enterprise middleware, API management, and digital transformation initiatives. Exploitation could lead to unauthorized code execution, enabling attackers to manipulate data flows, disrupt business processes, or gain persistent access to internal systems. Confidentiality breaches could expose sensitive customer or operational data, while integrity violations might corrupt critical integration logic, causing cascading failures. Availability impacts could result in downtime of essential services dependent on WSO2 Micro Integrator, affecting sectors such as finance, telecommunications, healthcare, and government services. The requirement for elevated privileges limits exploitation to trusted insiders or compromised accounts, but insider threats or credential theft scenarios are realistic. The vulnerability’s presence in multiple product versions increases the attack surface across organizations that have not yet upgraded. Given the critical role of integration platforms in European digital infrastructure, successful exploitation could have wide-reaching operational and reputational consequences.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy: 1) Immediately audit and restrict privileged user accounts to the minimum necessary, ensuring only trusted administrators have access to scripting engines. 2) Monitor logs and runtime behavior for unusual script executions or unauthorized code injections within the integration environment. 3) Apply vendor patches or updates as soon as they become available, even if no exploits are currently known. 4) Employ network segmentation to limit access to WSO2 Micro Integrator instances, especially restricting adjacent network access to trusted hosts. 5) Enforce strong authentication and credential management policies to prevent privilege escalation or account compromise. 6) Consider disabling or tightly controlling the use of GraalJS and NashornJS scripting engines if scripting capabilities are not essential. 7) Conduct regular security assessments and penetration tests focused on integration platforms to detect potential exploitation attempts. 8) Establish incident response plans specific to integration environment compromises to enable rapid containment and recovery.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain
CVE-2025-11093: CWE-94 Improper Control of Generation of Code ('Code Injection') in WSO2 WSO2 Micro Integrator
Description
An arbitrary code execution vulnerability exists in multiple WSO2 products due to insufficient restrictions in the GraalJS and NashornJS Script Mediator engines. Authenticated users with elevated privileges can execute arbitrary code within the integration runtime environment. By default, access to these scripting engines is limited to administrators in WSO2 Micro Integrator and WSO2 Enterprise Integrator, while in WSO2 API Manager, access extends to both administrators and API creators. This may allow trusted-but-privileged users to perform unauthorized actions or compromise the execution environment.
AI-Powered Analysis
Technical Analysis
CVE-2025-11093 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting WSO2 Micro Integrator and other WSO2 products that utilize GraalJS and NashornJS Script Mediator engines. These engines allow scripting capabilities within the integration runtime environment, but due to insufficient restrictions, authenticated users with elevated privileges can inject and execute arbitrary code. By default, access to these scripting engines is limited to administrators in WSO2 Micro Integrator and Enterprise Integrator, while in WSO2 API Manager, API creators also have access. This expanded access increases the attack surface, enabling trusted but privileged users to perform unauthorized actions, potentially leading to full system compromise. The vulnerability affects versions 4.0.0 through 4.4.0 and was published on November 5, 2025. The CVSS 3.1 base score of 8.4 reflects high severity, with attack vector requiring adjacent network access (AV:A), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (all high). No public exploits are known yet, but the potential for damage is significant given the ability to execute arbitrary code within critical integration environments. This vulnerability could be leveraged to pivot within enterprise networks, exfiltrate sensitive data, disrupt services, or deploy further malware.
Potential Impact
For European organizations, the impact of CVE-2025-11093 is substantial due to the widespread use of WSO2 integration products in enterprise middleware, API management, and digital transformation initiatives. Exploitation could lead to unauthorized code execution, enabling attackers to manipulate data flows, disrupt business processes, or gain persistent access to internal systems. Confidentiality breaches could expose sensitive customer or operational data, while integrity violations might corrupt critical integration logic, causing cascading failures. Availability impacts could result in downtime of essential services dependent on WSO2 Micro Integrator, affecting sectors such as finance, telecommunications, healthcare, and government services. The requirement for elevated privileges limits exploitation to trusted insiders or compromised accounts, but insider threats or credential theft scenarios are realistic. The vulnerability’s presence in multiple product versions increases the attack surface across organizations that have not yet upgraded. Given the critical role of integration platforms in European digital infrastructure, successful exploitation could have wide-reaching operational and reputational consequences.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy: 1) Immediately audit and restrict privileged user accounts to the minimum necessary, ensuring only trusted administrators have access to scripting engines. 2) Monitor logs and runtime behavior for unusual script executions or unauthorized code injections within the integration environment. 3) Apply vendor patches or updates as soon as they become available, even if no exploits are currently known. 4) Employ network segmentation to limit access to WSO2 Micro Integrator instances, especially restricting adjacent network access to trusted hosts. 5) Enforce strong authentication and credential management policies to prevent privilege escalation or account compromise. 6) Consider disabling or tightly controlling the use of GraalJS and NashornJS scripting engines if scripting capabilities are not essential. 7) Conduct regular security assessments and penetration tests focused on integration platforms to detect potential exploitation attempts. 8) Establish incident response plans specific to integration environment compromises to enable rapid containment and recovery.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- WSO2
- Date Reserved
- 2025-09-27T07:10:05.485Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690b9d3f5191fb7cf229892a
Added to database: 11/5/2025, 6:53:51 PM
Last enriched: 11/5/2025, 7:00:04 PM
Last updated: 11/6/2025, 7:16:10 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12471: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nerdpressteam Hubbub Lite – Fast, free social sharing and follow buttons
MediumCVE-2025-9338: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in ASUS Armoury Crate
HighCVE-2025-12560: CWE-918 Server-Side Request Forgery (SSRF) in pr-gateway Blog2Social: Social Media Auto Post & Scheduler
MediumCVE-2025-12563: CWE-862 Missing Authorization in pr-gateway Blog2Social: Social Media Auto Post & Scheduler
MediumCVE-2025-11271: CWE-807 Reliance on Untrusted Inputs in a Security Decision in smub Easy Digital Downloads – eCommerce Payments and Subscriptions made easy
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.