A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution.
By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution. By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload. | |
| Title | Authenticated arbitrary file upload via a System REST API requiring administrator permission. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2026-02-19T10:05:06.083Z
Reserved: 2025-11-24T05:01:57.688Z
Link: CVE-2025-13590
No data.
No data.
No data.
OpenCVE Enrichment
No data.