Miggo Logo

CVE-2025-2905: WSO2 API Manager XML External Entity (XXE) vulnerability

9.1

CVSS Score
3.1

Basic Information

EPSS Score
0.28635%
Published
5/5/2025
Updated
5/5/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.wso2.am:am-distribution-parentmaven< 2.1.02.1.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

I was unable to find the exact commit that fixes the vulnerability. The vulnerability is patched in version 2.1.0. I have listed the commits between v2.1.0-rc4 and v2.1.0-rc5 (which is the same as v2.1.0). However, none of these commits seem to be related to fixing an XXE vulnerability. Since I cannot find the exact commit, I cannot provide the vulnerable functions with high confidence. Therefore, I will return an empty list of vulnerable functions. The commit history between the specified tags mostly contains version bumps and license updates, with one commit changing a hash generator for response caching and another adding a SAML feature. None of these changes appear to address an XXE vulnerability related to XML input validation in URL paths within the gateway component. Without a clear patch, it's impossible to identify the specific vulnerable functions or how they were fixed based on the provided commit information. The available information is insufficient to pinpoint the vulnerable code or the mitigation strategy with any certainty. Therefore, no functions can be confidently identified as vulnerable or patched in relation to this specific XXE issue from the given commits.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n XML *xt*rn*l *ntity (XX*) vuln*r**ility *xists in t** **t*w*y *ompon*nt o* WSO* *PI M*n***r *u* to insu**i*i*nt v*li**tion o* XML input in *r**t** URL p*t*s. Us*r-suppli** XML is p*rs** wit*out *ppropri*t* r*stri*tions, *n**lin* *xt*rn*l *ntity r*

Reasoning

I w*s un**l* to *in* t** *x**t *ommit t**t *ix*s t** vuln*r**ility. T** vuln*r**ility is p*t**** in v*rsion *.*.*. I **v* list** t** *ommits **tw**n v*.*.*-r** *n* v*.*.*-r** (w*i** is t** s*m* *s v*.*.*). *ow*v*r, non* o* t**s* *ommits s**m to ** r*