Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.

Published: 5th March 2nd September 2021

Version: 12.0.0

Severity: High

CVSS Score: 7.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L)


This vulnerability has an impact only if the resource has a trailing slash (e.g. "/foo/"). If such is the case, this allows attackers to bypass the intended access restrictions of the scope protected resources. This could lead to confidentiality, integrity and availability impact to the back-end services, depending on the provided functionalities and the security controls in place.


If you are using an affected product version, it is highly recommended to migrate to the latest released version to the latest version of the affected WSO2 product is not mentioned under the affected product list, you may migrate to the latest version to receive security fixes. You Otherwise you may also apply the relevant fixes to the product based on the changes from the public fix:

Note: If you are a WSO2 customer with Support Subscription, please use WSO2 Update Manager (WUM) updates please use WSO2 Updates in order to apply the fix.