CVE-2025-10713

6.5 MEDIUM

📋 TL;DR

An XML External Entity (XXE) vulnerability in multiple WSO2 products allows attackers to read sensitive server files or cause denial-of-service. The vulnerability affects unauthenticated remote attackers who can submit XML to vulnerable endpoints. This impacts organizations using affected WSO2 products with default or insufficient XML parser configurations.

💻 Affected Systems

Products:
  • WSO2 API Manager
  • WSO2 Identity Server
  • WSO2 Enterprise Integrator
  • WSO2 Micro Integrator
  • WSO2 Streaming Integrator
  • WSO2 Open Banking
Versions: Multiple versions across WSO2 product lines - check specific advisory for exact affected versions
Operating Systems: All platforms running affected WSO2 products
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default XML parser configurations across multiple WSO2 products. Specific affected versions vary by product.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through sensitive file disclosure (e.g., configuration files, credentials, private keys) leading to data breach and potential lateral movement.

🟠

Likely Case

Unauthorized reading of server files containing configuration data, credentials, or other sensitive information, potentially enabling further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation, input validation, and XML parser hardening, though some risk remains until patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XXE vulnerabilities are well-understood with established exploitation techniques. While no public PoC exists for this specific CVE, XXE exploitation is generally straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check WSO2 security advisory WSO2-2025-4505 for specific patched versions per product

Vendor Advisory: https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4505/

Restart Required: Yes

Instructions:

1. Review WSO2 advisory WSO2-2025-4505 for affected versions. 2. Apply the security patch provided by WSO2. 3. Restart the WSO2 server. 4. Verify the fix by testing XXE payloads.

🔧 Temporary Workarounds

Disable XXE in XML parser

all

Configure XML parser to disable external entity resolution

Modify XML parser configuration in WSO2 to set: FEATURE_SECURE_PROCESSING = true, DISALLOW_DOCTYPE_DECL = true

Input validation and filtering

all

Implement XML input validation to reject malicious payloads

Implement XML schema validation or regex filtering for user-supplied XML

🧯 If You Can't Patch

  • Implement network-level controls to restrict XML input to trusted sources only
  • Deploy WAF with XXE protection rules and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Test with XXE payloads: Submit XML containing external entity references to WSO2 endpoints and check for file disclosure or error responses.

Check Version:

Check WSO2 product version via management console or server logs

Verify Fix Applied:

After patching, resubmit XXE test payloads and verify they are rejected or processed safely without external entity resolution.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors
  • File access attempts via XML parsing
  • Large XML payloads causing DoS

Network Indicators:

  • XML payloads containing external entity references (SYSTEM, PUBLIC declarations)
  • Unusual outbound connections from WSO2 servers

SIEM Query:

source="wso2" AND (message="*XXE*" OR message="*external entity*" OR message="*DOCTYPE*")

🔗 References

📤 Share & Export