Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11093: CWE-94 Improper Control of Generation of Code ('Code Injection') in WSO2 WSO2 Micro Integrator

0
High
VulnerabilityCVE-2025-11093cvecve-2025-11093cwe-94
Published: Wed Nov 05 2025 (11/05/2025, 18:31:17 UTC)
Source: CVE Database V5
Vendor/Project: WSO2
Product: WSO2 Micro Integrator

Description

CVE-2025-11093 is a high-severity arbitrary code execution vulnerability in WSO2 Micro Integrator and related WSO2 products. It arises from insufficient restrictions in the GraalJS and NashornJS Script Mediator engines, allowing authenticated users with elevated privileges to execute arbitrary code within the integration runtime. By default, scripting engine access is limited to administrators in WSO2 Micro Integrator and Enterprise Integrator, but also includes API creators in WSO2 API Manager, potentially broadening the attack surface. Exploitation requires privileged authentication but no user interaction, impacting confidentiality, integrity, and availability severely. No known exploits are reported in the wild yet. European organizations using affected WSO2 versions 4. 0. 0 through 4. 4. 0 should prioritize patching and restrict scripting engine access.

AI-Powered Analysis

AILast updated: 11/12/2025, 20:19:45 UTC

Technical Analysis

CVE-2025-11093 is a code injection vulnerability categorized under CWE-94 affecting multiple WSO2 products, notably WSO2 Micro Integrator versions 4.0.0 to 4.4.0. The root cause lies in insufficient restrictions on the GraalJS and NashornJS Script Mediator engines, which are components that allow scripting within the integration runtime environment. Authenticated users with elevated privileges—administrators in Micro Integrator and Enterprise Integrator, and both administrators and API creators in API Manager—can exploit this flaw to execute arbitrary code. This code execution occurs within the integration runtime, potentially allowing attackers to manipulate integration flows, access sensitive data, or disrupt services. The vulnerability has a CVSS v3.1 score of 8.4, reflecting high severity due to its impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and no requirement for user interaction. Although no known exploits have been reported in the wild, the vulnerability's presence in widely used integration products poses a significant risk. The integration runtime often serves as a critical middleware layer connecting various enterprise systems, so compromise here can cascade into broader organizational impacts. The vulnerability affects multiple WSO2 product lines, increasing the scope of potential targets. The default access model extends scripting engine permissions beyond administrators in some products, increasing the risk surface. The lack of vendor patches at the time of disclosure necessitates immediate compensating controls to mitigate risk.

Potential Impact

For European organizations, the impact of CVE-2025-11093 can be substantial. WSO2 Micro Integrator and related products are commonly used in enterprise integration scenarios, including financial services, telecommunications, government, and manufacturing sectors prevalent across Europe. Successful exploitation could lead to unauthorized code execution, enabling attackers to exfiltrate sensitive data, disrupt business-critical integration workflows, or pivot to other internal systems. This threatens confidentiality, integrity, and availability of enterprise data and services. Given the integration layer's central role, disruption could affect multiple downstream applications and services, amplifying operational impact. The vulnerability's exploitation requires privileged authentication, which limits exposure to insider threats or compromised privileged accounts, but also means that attackers who gain such credentials can cause severe damage. European organizations with complex integration architectures or those that delegate scripting privileges to API creators face heightened risk. The absence of known exploits currently provides a window for proactive defense, but also means attackers may develop exploits rapidly once details are public. The potential for lateral movement and persistence within enterprise environments increases the overall threat level.

Mitigation Recommendations

To mitigate CVE-2025-11093, European organizations should immediately review and restrict access to the GraalJS and NashornJS Script Mediator engines. Limit scripting engine permissions strictly to trusted administrators and avoid granting API creators or other users elevated scripting privileges unless absolutely necessary. Implement robust identity and access management controls, including multi-factor authentication for privileged accounts, to reduce the risk of credential compromise. Monitor and audit all scripting activity within the integration runtime to detect anomalous behavior indicative of exploitation attempts. Network segmentation and isolation of integration runtimes can limit the blast radius if compromise occurs. Apply vendor patches promptly once released; in the absence of patches, consider disabling scripting features if feasible or deploying compensating controls such as runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to monitor for suspicious code execution. Conduct thorough security reviews of integration workflows and scripts to identify and remediate insecure configurations. Educate privileged users on the risks associated with scripting engines and enforce strict change management policies. Finally, maintain up-to-date backups and incident response plans tailored to integration platform compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
WSO2
Date Reserved
2025-09-27T07:10:05.485Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690b9d3f5191fb7cf229892a

Added to database: 11/5/2025, 6:53:51 PM

Last enriched: 11/12/2025, 8:19:45 PM

Last updated: 12/21/2025, 2:31:35 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats