Loading
Due to an insufficient access control implementation in multiple WSO2 Products, authentication and authorization checks for certain REST APIs can be bypassed, allowing them to be invoked without proper validation. Successful exploitation of this vulnerability could lead to a malicious actor gaining administrative access and performing unauthenticated and unauthorized administrative operations.
Use CWE-863, Wso2 vendor hub and Api Control Plane product page to widen CVE-2025-10611 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-9312, CVE-2025-9804 and CVE-2025-13590 for nearby disclosures in the same product family.