CVE-2024-1524: CWE-290 Authentication Bypass by Spoofing in WSO2 WSO2 API Manager
When the "Silent Just-In-Time Provisioning" feature is enabled for a federated identity provider (IDP) there is a risk that a local user store user's information may be replaced during the account provisioning process in cases where federated users share the same username as local users. There will be no impact on your deployment if any of the preconditions mentioned below are not met. Only when all the preconditions mentioned below are fulfilled could a malicious actor associate a targeted local user account with a federated IDP user account that they control. The Deployment should have: -An IDP configured for federated authentication with Silent JIT provisioning enabled. The malicious actor should have: -A fresh valid user account in the federated IDP that has not been used earlier. -Knowledge of the username of a valid user in the local IDP. -An account at the federated IDP matching the targeted local username.
AI Analysis
Technical Summary
CVE-2024-1524 is an authentication bypass vulnerability classified under CWE-290 affecting WSO2 API Manager version 4.2.0. The issue arises when the Silent Just-In-Time Provisioning feature is enabled for federated identity providers. This feature automatically provisions user accounts from federated IDPs into the local user store upon authentication. However, if a federated user account shares the same username as an existing local user, the provisioning process can overwrite or replace the local user's information with that of the federated user. This creates a risk where a malicious actor controlling a fresh federated IDP account with a username matching a local user can associate their federated identity with the local user account. The attack does not require prior privileges or user interaction but depends on the attacker knowing a valid local username and having a fresh federated account. The vulnerability impacts confidentiality and integrity by allowing unauthorized access and potential data manipulation under the guise of a legitimate local user. The CVSS v3.1 base score is 7.7, reflecting network attack vector, high complexity, no privileges required, no user interaction, and high impact on confidentiality and integrity with low impact on availability. No patches or exploits are currently known. This vulnerability specifically affects deployments with federated authentication configured and Silent JIT provisioning enabled, making it a targeted but serious risk for affected organizations.
Potential Impact
The primary impact of CVE-2024-1524 is unauthorized access to local user accounts through identity spoofing, which compromises confidentiality and integrity of sensitive data and systems managed by WSO2 API Manager. Attackers can impersonate legitimate users, potentially gaining access to APIs, backend services, and sensitive business logic protected by the API Manager. This can lead to data breaches, unauthorized transactions, and disruption of trust in federated authentication mechanisms. Although availability impact is low, the breach of trust and data integrity can have severe operational and reputational consequences. Organizations relying on federated identity providers with Silent JIT provisioning enabled are at risk, especially if usernames are predictable or publicly known. The vulnerability could be exploited in targeted attacks against enterprises, government agencies, and service providers using WSO2 API Manager for API governance and security.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first assess whether Silent Just-In-Time Provisioning is enabled for federated IDPs in their WSO2 API Manager deployments. If enabled, consider disabling this feature temporarily until a vendor patch is available. Implement strict username uniqueness policies across local and federated user stores to prevent username collisions. Employ monitoring and alerting for unusual provisioning activities or account changes. Use strong identity governance and access management controls to detect and block suspicious federated account creations matching local usernames. Additionally, restrict knowledge of valid local usernames by limiting information disclosure through error messages or user enumeration vectors. Engage with WSO2 for updates and patches addressing this issue and apply them promptly once released. Consider multi-factor authentication and additional verification steps for federated users to reduce risk. Finally, conduct regular security audits and penetration testing focusing on federated authentication flows.
Affected Countries
United States, India, United Kingdom, Germany, Australia, Canada, Singapore, Netherlands, France, Japan
CVE-2024-1524: CWE-290 Authentication Bypass by Spoofing in WSO2 WSO2 API Manager
Description
When the "Silent Just-In-Time Provisioning" feature is enabled for a federated identity provider (IDP) there is a risk that a local user store user's information may be replaced during the account provisioning process in cases where federated users share the same username as local users. There will be no impact on your deployment if any of the preconditions mentioned below are not met. Only when all the preconditions mentioned below are fulfilled could a malicious actor associate a targeted local user account with a federated IDP user account that they control. The Deployment should have: -An IDP configured for federated authentication with Silent JIT provisioning enabled. The malicious actor should have: -A fresh valid user account in the federated IDP that has not been used earlier. -Knowledge of the username of a valid user in the local IDP. -An account at the federated IDP matching the targeted local username.
AI-Powered Analysis
Technical Analysis
CVE-2024-1524 is an authentication bypass vulnerability classified under CWE-290 affecting WSO2 API Manager version 4.2.0. The issue arises when the Silent Just-In-Time Provisioning feature is enabled for federated identity providers. This feature automatically provisions user accounts from federated IDPs into the local user store upon authentication. However, if a federated user account shares the same username as an existing local user, the provisioning process can overwrite or replace the local user's information with that of the federated user. This creates a risk where a malicious actor controlling a fresh federated IDP account with a username matching a local user can associate their federated identity with the local user account. The attack does not require prior privileges or user interaction but depends on the attacker knowing a valid local username and having a fresh federated account. The vulnerability impacts confidentiality and integrity by allowing unauthorized access and potential data manipulation under the guise of a legitimate local user. The CVSS v3.1 base score is 7.7, reflecting network attack vector, high complexity, no privileges required, no user interaction, and high impact on confidentiality and integrity with low impact on availability. No patches or exploits are currently known. This vulnerability specifically affects deployments with federated authentication configured and Silent JIT provisioning enabled, making it a targeted but serious risk for affected organizations.
Potential Impact
The primary impact of CVE-2024-1524 is unauthorized access to local user accounts through identity spoofing, which compromises confidentiality and integrity of sensitive data and systems managed by WSO2 API Manager. Attackers can impersonate legitimate users, potentially gaining access to APIs, backend services, and sensitive business logic protected by the API Manager. This can lead to data breaches, unauthorized transactions, and disruption of trust in federated authentication mechanisms. Although availability impact is low, the breach of trust and data integrity can have severe operational and reputational consequences. Organizations relying on federated identity providers with Silent JIT provisioning enabled are at risk, especially if usernames are predictable or publicly known. The vulnerability could be exploited in targeted attacks against enterprises, government agencies, and service providers using WSO2 API Manager for API governance and security.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first assess whether Silent Just-In-Time Provisioning is enabled for federated IDPs in their WSO2 API Manager deployments. If enabled, consider disabling this feature temporarily until a vendor patch is available. Implement strict username uniqueness policies across local and federated user stores to prevent username collisions. Employ monitoring and alerting for unusual provisioning activities or account changes. Use strong identity governance and access management controls to detect and block suspicious federated account creations matching local usernames. Additionally, restrict knowledge of valid local usernames by limiting information disclosure through error messages or user enumeration vectors. Engage with WSO2 for updates and patches addressing this issue and apply them promptly once released. Consider multi-factor authentication and additional verification steps for federated users to reduce risk. Finally, conduct regular security audits and penetration testing focusing on federated authentication flows.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- WSO2
- Date Reserved
- 2024-02-15T06:54:41.277Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699d6c99be58cf853b9c9dbd
Added to database: 2/24/2026, 9:17:13 AM
Last enriched: 2/24/2026, 9:31:34 AM
Last updated: 2/24/2026, 11:37:37 PM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27593: CWE-640: Weak Password Recovery Mechanism for Forgotten Password in statamic cms
CriticalCVE-2026-27117: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in rikyoz bit7z
MediumCVE-2026-27572: CWE-770: Allocation of Resources Without Limits or Throttling in bytecodealliance wasmtime
MediumCVE-2026-27204: CWE-400: Uncontrolled Resource Consumption in bytecodealliance wasmtime
MediumCVE-2026-27195: CWE-755: Improper Handling of Exceptional Conditions in bytecodealliance wasmtime
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.