PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-4311 Wso2 CVE debrief

CVE-2016-4311 is a high-severity cross-site request forgery (CSRF) issue in the XACML flow feature of WSO2 Identity Server 5.1.0. A remote attacker could abuse a logged-in privileged user’s session to submit unintended XACML-related requests through entitlement/eval-policy-submit.jsp. The NVD record rates the issue as CVSS 3.0 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and maps it to CWE-352.

Vendor
Wso2
Product
CVE-2016-4311
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-17
Original CVE updated
2026-05-13
Advisory published
2017-02-17
Advisory updated
2026-05-13

Who should care

Organizations running WSO2 Identity Server 5.1.0, especially administrators or privileged users who use the XACML entitlement flow and access the entitlement/eval-policy-submit.jsp endpoint.

Technical summary

The vulnerability is a CSRF flaw in the XACML flow feature. Because the affected request can be triggered through a privileged user’s authenticated browser session, an attacker may cause that user to perform XACML request-processing actions without intent. NVD identifies the weakness as CWE-352 and lists the vulnerable CPE as wso2:identity_server:5.1.0.

Defensive priority

High. The issue is network-reachable and requires only user interaction from a privileged authenticated user, while the recorded impact is high across confidentiality, integrity, and availability.

Recommended defensive actions

  • Review WSO2 Security Advisory WSO2-2016-0096 and apply the vendor-recommended fix or update path.
  • Verify whether WSO2 Identity Server 5.1.0 is deployed and whether the entitlement/eval-policy-submit.jsp flow is reachable.
  • Enforce CSRF protections on state-changing endpoints and confirm that privileged administrative workflows require anti-CSRF tokens.
  • Limit exposure of administrative interfaces and reduce the number of privileged users who can access the XACML flow.
  • Validate that web sessions use secure browser-side controls appropriate for admin actions, and retest after remediation.

Evidence notes

This debrief is based on the CVE/NVD record and its referenced vendor advisory. The CVE was published on 2017-02-17 and later modified on 2026-05-13 in the supplied source data. NVD lists the weakness as CWE-352 and the CVSS vector as AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The source metadata also references third-party exploit/advisory pages, but this summary does not rely on them for technical detail.

Official resources

Publicly disclosed in the CVE/NVD record on 2017-02-17. The supplied NVD metadata also cites a WSO2 vendor advisory and multiple third-party advisory/exploit references.