CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-7074: Authenticated Arbitrary File Upload in Multiple WSO2 Products via SOAP Admin Service Leading to Remote Code Execution

6.8 CVSS

Description

An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server.

By leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users.

Classification

CVE ID: CVE-2024-7074

CVSS Base Severity: MEDIUM

CVSS Base Score: 6.8

CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem Types

CWE-434 Unrestricted Upload of File with Dangerous Type

Affected Products

Vendor: WSO2

Product: WSO2 Enterprise Integrator, WSO2 API Manager, WSO2 Enterprise Service Bus, WSO2 Enterprise Mobility Manager, WSO2 Micro Integrator, WSO2 Open Banking AM, WSO2 Carbon Synapse Artifact Uploader BE

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.06% (probability of being exploited)

EPSS Percentile: 17.9% (scored less or equal to compared to others)

EPSS Date: 2025-07-01 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2024-7074
https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3566/

Timeline