CVE-2025-6670

EUVD-2025-197976
A Cross-Site Request Forgery (CSRF) vulnerability exists in multiple WSO2 products due to the use of the HTTP GET method for state-changing operations within admin services, specifically in the event processor of the Carbon console. Although the SameSite=Lax cookie attribute is used as a mitigation, it is ineffective in this context because it allows cookies to be sent with cross-origin top-level navigations using GET requests.

A malicious actor can exploit this vulnerability by tricking an authenticated user into visiting a crafted link, leading the browser to issue unintended state-changing requests. Successful exploitation could result in unauthorized operations such as data modification, account changes, or other administrative actions. According to WSO2 Secure Production Guidelines, exposure of Carbon console services to untrusted networks is discouraged, which may reduce the impact in properly secured deployments.
CSRF
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
WSO2CNA
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 6%
Affected Products (NVD)
VendorProductVersion
wso2api_control_plane
4.5.0
wso2api_control_plane
4.6.0
wso2api_manager
3.1.0
wso2api_manager
3.2.0
wso2api_manager
3.2.1
wso2api_manager
4.0.0
wso2api_manager
4.1.0
wso2api_manager
4.2.0
wso2api_manager
4.3.0
wso2api_manager
4.4.0
wso2api_manager
4.5.0
wso2api_manager
4.6.0
wso2enterprise_integrator
6.6.0
wso2identity_server
5.10.0
wso2identity_server
5.11.0
wso2identity_server
6.0.0
wso2identity_server
6.1.0
wso2identity_server
7.0.0
wso2identity_server
7.1.0
wso2identity_server
7.2.0
wso2identity_server_as_key_manager
5.10.0
wso2open_banking_am
2.0.0
wso2open_banking_iam
2.0.0
wso2traffic_manager
4.5.0
wso2traffic_manager
4.6.0
wso2universal_gateway
4.5.0
wso2universal_gateway
4.6.0
𝑥
= Vulnerable software versions