CVE-2025-5350: CWE-918 Server-Side Request Forgery (SSRF) in WSO2 WSO2 Identity Server
SSRF and Reflected XSS Vulnerabilities exist in multiple WSO2 products within the deprecated Try-It feature, which was accessible only to administrative users. This feature accepted user-supplied URLs without proper validation, leading to server-side request forgery (SSRF). Additionally, the retrieved content was directly reflected in the HTTP response, enabling reflected cross-site scripting (XSS) in the admin user's browser context. By tricking an administrator into accessing a crafted link, an attacker could force the server to fetch malicious content and reflect it into the admin’s browser, leading to arbitrary JavaScript execution for UI manipulation or data exfiltration. While session cookies are protected with the HttpOnly flag, the XSS still poses a significant security risk. Furthermore, SSRF can be used by a privileged user to query internal services, potentially aiding in internal network enumeration if the target endpoints are reachable from the affected product.
AI Analysis
Technical Summary
CVE-2025-5350 is a vulnerability identified in multiple versions of WSO2 Identity Server (5.10.0 through 7.1.0) that combines server-side request forgery (SSRF) and reflected cross-site scripting (XSS) vulnerabilities within the deprecated Try-It feature. This feature, accessible only to administrative users, accepts user-supplied URLs without proper validation, allowing an attacker to force the server to make arbitrary HTTP requests to internal or external resources. The content retrieved by these requests is then directly reflected in the HTTP response to the administrator’s browser, enabling reflected XSS attacks. This XSS can execute arbitrary JavaScript in the context of the admin user’s session, potentially leading to UI manipulation or data exfiltration, although session cookies are protected by the HttpOnly flag, limiting cookie theft. The SSRF component also poses a risk by enabling privileged users to query internal services that may not be otherwise accessible, aiding internal network enumeration and potentially facilitating further attacks. Exploitation requires tricking an administrator into clicking a maliciously crafted link, with no additional user interaction required. The vulnerability has a CVSS 3.1 base score of 5.9, indicating medium severity due to the need for high privileges but low attack complexity and the potential for confidentiality, integrity, and availability impacts. No public exploits are currently known, and no patches have been linked yet, emphasizing the need for immediate mitigation steps. The vulnerability is tracked under CWE-918 (SSRF) and CWE-79 (Reflected XSS).
Potential Impact
For European organizations, this vulnerability presents a significant risk primarily in environments where WSO2 Identity Server is deployed for identity and access management. The SSRF aspect can allow attackers or malicious insiders with administrative access to probe internal network services, potentially exposing sensitive internal infrastructure details or accessing restricted services. The reflected XSS can lead to arbitrary script execution in the administrator’s browser, risking UI manipulation, unauthorized actions, or data leakage within the administrative context. Although session cookies are protected, the XSS still enables impactful attacks such as credential theft via other means, phishing, or manipulation of administrative workflows. This could lead to compromised identity management, unauthorized access, and potential lateral movement within the network. Given the critical role of identity servers in authentication and authorization, exploitation could disrupt business operations and compromise sensitive data. The medium CVSS score reflects moderate risk, but the requirement for administrative privileges and user interaction (clicking a crafted link) somewhat limits the attack surface. However, targeted attacks against high-value European organizations, especially those with large internal networks or complex identity infrastructures, could have serious consequences.
Mitigation Recommendations
European organizations should immediately disable the deprecated Try-It feature in affected WSO2 Identity Server versions to eliminate the attack vector. If disabling is not feasible, restrict access to the administrative interface strictly to trusted networks and users, employing network segmentation and multi-factor authentication to reduce the risk of administrator compromise. Monitor administrative user activity for suspicious link clicks or unusual behavior. Implement web application firewalls (WAFs) with rules to detect and block SSRF and reflected XSS patterns targeting the Try-It feature endpoints. Regularly audit and update WSO2 Identity Server to the latest versions once patches become available. Conduct internal network scans to identify and secure any internal services that could be exposed via SSRF. Educate administrators about phishing risks and the dangers of clicking untrusted links, especially within administrative contexts. Finally, implement robust logging and alerting on administrative actions and unusual HTTP requests to detect exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-5350: CWE-918 Server-Side Request Forgery (SSRF) in WSO2 WSO2 Identity Server
Description
SSRF and Reflected XSS Vulnerabilities exist in multiple WSO2 products within the deprecated Try-It feature, which was accessible only to administrative users. This feature accepted user-supplied URLs without proper validation, leading to server-side request forgery (SSRF). Additionally, the retrieved content was directly reflected in the HTTP response, enabling reflected cross-site scripting (XSS) in the admin user's browser context. By tricking an administrator into accessing a crafted link, an attacker could force the server to fetch malicious content and reflect it into the admin’s browser, leading to arbitrary JavaScript execution for UI manipulation or data exfiltration. While session cookies are protected with the HttpOnly flag, the XSS still poses a significant security risk. Furthermore, SSRF can be used by a privileged user to query internal services, potentially aiding in internal network enumeration if the target endpoints are reachable from the affected product.
AI-Powered Analysis
Technical Analysis
CVE-2025-5350 is a vulnerability identified in multiple versions of WSO2 Identity Server (5.10.0 through 7.1.0) that combines server-side request forgery (SSRF) and reflected cross-site scripting (XSS) vulnerabilities within the deprecated Try-It feature. This feature, accessible only to administrative users, accepts user-supplied URLs without proper validation, allowing an attacker to force the server to make arbitrary HTTP requests to internal or external resources. The content retrieved by these requests is then directly reflected in the HTTP response to the administrator’s browser, enabling reflected XSS attacks. This XSS can execute arbitrary JavaScript in the context of the admin user’s session, potentially leading to UI manipulation or data exfiltration, although session cookies are protected by the HttpOnly flag, limiting cookie theft. The SSRF component also poses a risk by enabling privileged users to query internal services that may not be otherwise accessible, aiding internal network enumeration and potentially facilitating further attacks. Exploitation requires tricking an administrator into clicking a maliciously crafted link, with no additional user interaction required. The vulnerability has a CVSS 3.1 base score of 5.9, indicating medium severity due to the need for high privileges but low attack complexity and the potential for confidentiality, integrity, and availability impacts. No public exploits are currently known, and no patches have been linked yet, emphasizing the need for immediate mitigation steps. The vulnerability is tracked under CWE-918 (SSRF) and CWE-79 (Reflected XSS).
Potential Impact
For European organizations, this vulnerability presents a significant risk primarily in environments where WSO2 Identity Server is deployed for identity and access management. The SSRF aspect can allow attackers or malicious insiders with administrative access to probe internal network services, potentially exposing sensitive internal infrastructure details or accessing restricted services. The reflected XSS can lead to arbitrary script execution in the administrator’s browser, risking UI manipulation, unauthorized actions, or data leakage within the administrative context. Although session cookies are protected, the XSS still enables impactful attacks such as credential theft via other means, phishing, or manipulation of administrative workflows. This could lead to compromised identity management, unauthorized access, and potential lateral movement within the network. Given the critical role of identity servers in authentication and authorization, exploitation could disrupt business operations and compromise sensitive data. The medium CVSS score reflects moderate risk, but the requirement for administrative privileges and user interaction (clicking a crafted link) somewhat limits the attack surface. However, targeted attacks against high-value European organizations, especially those with large internal networks or complex identity infrastructures, could have serious consequences.
Mitigation Recommendations
European organizations should immediately disable the deprecated Try-It feature in affected WSO2 Identity Server versions to eliminate the attack vector. If disabling is not feasible, restrict access to the administrative interface strictly to trusted networks and users, employing network segmentation and multi-factor authentication to reduce the risk of administrator compromise. Monitor administrative user activity for suspicious link clicks or unusual behavior. Implement web application firewalls (WAFs) with rules to detect and block SSRF and reflected XSS patterns targeting the Try-It feature endpoints. Regularly audit and update WSO2 Identity Server to the latest versions once patches become available. Conduct internal network scans to identify and secure any internal services that could be exposed via SSRF. Educate administrators about phishing risks and the dangers of clicking untrusted links, especially within administrative contexts. Finally, implement robust logging and alerting on administrative actions and unusual HTTP requests to detect exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WSO2
- Date Reserved
- 2025-05-30T06:56:02.711Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68fb50f0c5193890929c8392
Added to database: 10/24/2025, 10:12:00 AM
Last enriched: 10/24/2025, 10:12:39 AM
Last updated: 10/24/2025, 1:57:55 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
North Korean Hackers Aim at European Drone Companies
MediumCVE-2025-39898
UnknownIn Other News: iOS 26 Deletes Spyware Evidence, Shadow Escape Attack, Cyber Exec Sold Secrets to Russia
MediumCVE-2025-11576: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in newcodebyte AI Chatbot Free Models – Customer Support, Live Chat, Virtual Assistant
MediumCVE-2025-27632: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in Hitachi Energy TRMTracker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.