CVE-2025-9312
Improper Certificate-Based Authentication Enforcement in Multiple WSO2 Products
Description
A missing authentication enforcement vulnerability exists in the mutual TLS (mTLS) implementation used by System REST APIs and SOAP services in multiple WSO2 products. Due to improper validation of client certificate–based authentication in certain default configurations, the affected components may permit unauthenticated requests even when mTLS is enabled. This condition occurs when relying on the default mTLS settings for System REST APIs or when the mTLS authenticator is enabled for SOAP services, causing these interfaces to accept requests without enforcing additional authentication. Successful exploitation allows a malicious actor with network access to the affected endpoints to gain administrative privileges and perform unauthorized operations. The vulnerability is exploitable only when the impacted mTLS flows are enabled and accessible in a given deployment. Other certificate-based authentication mechanisms—such as Mutual TLS OAuth client authentication and X.509 login flows—are not affected, and APIs served through the API Gateway of WSO2 API Manager remain unaffected.
INFO
Published Date :
Nov. 18, 2025, 12:05 p.m.
Last Modified :
Nov. 18, 2025, 12:05 p.m.
Remotely Exploit :
Yes !
Source :
WSO2
Affected Products
The following products are affected by CVE-2025-9312
vulnerability.
Even if cvefeed.io is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
No affected product recoded yet
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | CRITICAL | ed10eef1-636d-4fbe-9993-6890dfa878f8 |
Solution
- Review and update mTLS configurations.
- Enforce proper client certificate validation.
- Apply product-specific security patches.
- Test authentication for all endpoints.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-9312 vulnerability anywhere in the article.