{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T14:10:51.051","vulnerabilities":[{"cve":{"id":"CVE-2024-7074","sourceIdentifier":"ed10eef1-636d-4fbe-9993-6890dfa878f8","published":"2025-06-02T17:15:36.250","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server.\n\nBy leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users."},{"lang":"es","value":"Existe una vulnerabilidad de carga de archivos arbitrarios en varios productos WSO2 debido a la validación incorrecta de la entrada del usuario en los servicios de administración SOAP. Un agente malicioso con privilegios administrativos puede cargar un archivo arbitrario en una ubicación del servidor controlada por el usuario. Al aprovechar esta vulnerabilidad, un atacante podría cargar una carga útil especialmente manipulada, lo que podría provocar una ejecución remota de código (RCE) en el servidor. Su explotación requiere credenciales de administrador válidas, lo que limita su impacto a usuarios autorizados, pero potencialmente maliciosos."}],"metrics":{"cvssMetricV31":[{"source":"ed10eef1-636d-4fbe-9993-6890dfa878f8","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9}]},"weaknesses":[{"source":"ed10eef1-636d-4fbe-9993-6890dfa878f8","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]}],"references":[{"url":"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3566/","source":"ed10eef1-636d-4fbe-9993-6890dfa878f8"}]}}]}