Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11093: CWE-94 Improper Control of Generation of Code ('Code Injection') in WSO2 WSO2 Micro Integrator

0
High
VulnerabilityCVE-2025-11093cvecve-2025-11093cwe-94
Published: Wed Nov 05 2025 (11/05/2025, 18:31:17 UTC)
Source: CVE Database V5
Vendor/Project: WSO2
Product: WSO2 Micro Integrator

Description

An arbitrary code execution vulnerability exists in multiple WSO2 products due to insufficient restrictions in the GraalJS and NashornJS Script Mediator engines. Authenticated users with elevated privileges can execute arbitrary code within the integration runtime environment. By default, access to these scripting engines is limited to administrators in WSO2 Micro Integrator and WSO2 Enterprise Integrator, while in WSO2 API Manager, access extends to both administrators and API creators. This may allow trusted-but-privileged users to perform unauthorized actions or compromise the execution environment.

AI-Powered Analysis

AILast updated: 11/05/2025, 19:00:04 UTC

Technical Analysis

CVE-2025-11093 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting WSO2 Micro Integrator and other WSO2 products that utilize GraalJS and NashornJS Script Mediator engines. These engines allow scripting capabilities within the integration runtime environment, but due to insufficient restrictions, authenticated users with elevated privileges can inject and execute arbitrary code. By default, access to these scripting engines is limited to administrators in WSO2 Micro Integrator and Enterprise Integrator, while in WSO2 API Manager, API creators also have access. This expanded access increases the attack surface, enabling trusted but privileged users to perform unauthorized actions, potentially leading to full system compromise. The vulnerability affects versions 4.0.0 through 4.4.0 and was published on November 5, 2025. The CVSS 3.1 base score of 8.4 reflects high severity, with attack vector requiring adjacent network access (AV:A), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (all high). No public exploits are known yet, but the potential for damage is significant given the ability to execute arbitrary code within critical integration environments. This vulnerability could be leveraged to pivot within enterprise networks, exfiltrate sensitive data, disrupt services, or deploy further malware.

Potential Impact

For European organizations, the impact of CVE-2025-11093 is substantial due to the widespread use of WSO2 integration products in enterprise middleware, API management, and digital transformation initiatives. Exploitation could lead to unauthorized code execution, enabling attackers to manipulate data flows, disrupt business processes, or gain persistent access to internal systems. Confidentiality breaches could expose sensitive customer or operational data, while integrity violations might corrupt critical integration logic, causing cascading failures. Availability impacts could result in downtime of essential services dependent on WSO2 Micro Integrator, affecting sectors such as finance, telecommunications, healthcare, and government services. The requirement for elevated privileges limits exploitation to trusted insiders or compromised accounts, but insider threats or credential theft scenarios are realistic. The vulnerability’s presence in multiple product versions increases the attack surface across organizations that have not yet upgraded. Given the critical role of integration platforms in European digital infrastructure, successful exploitation could have wide-reaching operational and reputational consequences.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy: 1) Immediately audit and restrict privileged user accounts to the minimum necessary, ensuring only trusted administrators have access to scripting engines. 2) Monitor logs and runtime behavior for unusual script executions or unauthorized code injections within the integration environment. 3) Apply vendor patches or updates as soon as they become available, even if no exploits are currently known. 4) Employ network segmentation to limit access to WSO2 Micro Integrator instances, especially restricting adjacent network access to trusted hosts. 5) Enforce strong authentication and credential management policies to prevent privilege escalation or account compromise. 6) Consider disabling or tightly controlling the use of GraalJS and NashornJS scripting engines if scripting capabilities are not essential. 7) Conduct regular security assessments and penetration tests focused on integration platforms to detect potential exploitation attempts. 8) Establish incident response plans specific to integration environment compromises to enable rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
WSO2
Date Reserved
2025-09-27T07:10:05.485Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690b9d3f5191fb7cf229892a

Added to database: 11/5/2025, 6:53:51 PM

Last enriched: 11/5/2025, 7:00:04 PM

Last updated: 11/6/2025, 7:16:10 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats