CVE-2025-2905
Java vulnerability analysis and mitigation

Overview

An XML External Entity (XXE) vulnerability (CVE-2025-2905) was identified in the gateway component of WSO2 API Manager 2.0.0 and earlier versions. The vulnerability was discovered on May 5, 2025, and received a Critical CVSS v3.1 base score of 9.1 with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H. The issue stems from insufficient validation of XML input in crafted URL paths, where user-supplied XML is parsed without appropriate restrictions, enabling external entity resolution (WSO2 Advisory, NVD).

Technical details

The vulnerability exists due to improper validation of XML input when processing crafted URL paths in the gateway component. The flaw allows XML parsing without sufficient restrictions, enabling XML External Entity (XXE) resolution. The vulnerability has been assigned CWE-611 (Improper Restriction of XML External Entity Reference) and can be exploited by an unauthenticated remote attacker (SecurityOnline, WSO2 Advisory).

Impact

The vulnerability can be exploited by an unauthenticated remote attacker to read files from the server's filesystem and perform denial-of-service (DoS) attacks. The extent of file access varies depending on the Java runtime environment: on JDK 7 or early JDK 8, full file contents may be exposed, while on later versions of JDK 8 and newer, only the first line of a file may be readable. Additionally, DoS attacks using malicious payloads like 'Billion Laughs' can cause service disruption (SecurityOnline, WSO2 Advisory).

Mitigation and workarounds

No new fix will be released for this vulnerability as it was already addressed in the patch provided for WSO2-2016-0151, which resolved both a previously disclosed XSS vulnerability and this XXE vulnerability. Organizations that have already applied the fix for WSO2-2016-0151 require no further action. However, those who haven't applied the earlier fix are strongly advised to do so immediately (WSO2 Advisory).

Community reactions

WSO2 credits the researcher crnkovic for responsibly reporting the vulnerability and collaborating on its resolution. Despite sharing its fix with a previously disclosed Medium severity issue (XSS), WSO2 published a separate advisory to ensure users are aware of the Critical severity (CVSS 9.1) of this XXE vulnerability (WSO2 Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-41243CRITICAL10
  • JavaJava
  • org.springframework.cloud:spring-cloud-gateway-server-webflux
NoYesSep 16, 2025
CVE-2025-43801MEDIUM6.9
  • JavaJava
  • cpe:2.3:a:liferay:liferay_portal
NoYesSep 16, 2025
GHSA-3wfh-36rx-9537MEDIUM6.6
  • JavaJava
  • com.ongres.scram:scram-common
NoYesSep 16, 2025
CVE-2025-43797MEDIUM5.3
  • JavaJava
  • com.liferay:com.liferay.site.admin.web
NoYesSep 15, 2025
CVE-2025-43802MEDIUM4.8
  • JavaJava
  • cpe:2.3:a:liferay:liferay_portal
NoYesSep 15, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management