CVE-2025-0672: Vulnerability in WSO2 WSO2 Identity Server as Key Manager
An authentication bypass vulnerability exists in multiple WSO2 products when FIDO authentication is enabled. When a user account is deleted, the system does not automatically remove associated FIDO registration data. If a new user account is later created using the same username, the system may associate the new account with the previously registered FIDO device. This flaw may allow a previously deleted user to authenticate using their FIDO credentials and impersonate the newly created user, resulting in unauthorized access. The vulnerability applies only to deployments that utilize FIDO-based authentication.
AI Analysis
Technical Summary
CVE-2025-0672 is an authentication bypass vulnerability affecting WSO2 Identity Server when used as a Key Manager, specifically in version 5.10.0. The vulnerability arises in deployments that enable FIDO-based authentication. The core issue is that when a user account is deleted, the system fails to remove the associated FIDO registration data. Consequently, if a new user account is created with the same username as the deleted account, the system may incorrectly associate the new account with the old FIDO device registration. This flaw allows an attacker who previously had access to the deleted user account's FIDO credentials to authenticate as the new user, effectively impersonating them and gaining unauthorized access. The vulnerability is classified under CWE-287 (Improper Authentication). The CVSS v3.1 score is 3.3, indicating a low severity level, with the vector reflecting network attack vector (AV:N), high attack complexity (AC:H), requiring privileged attacker (PR:H), no user interaction (UI:N), unchanged scope (S:U), and low impact on confidentiality and integrity (C:L/I:L) with no impact on availability (A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is particularly relevant for organizations using WSO2 Identity Server as a Key Manager with FIDO authentication enabled, as it undermines the trust model of FIDO by allowing reuse of authentication credentials tied to deleted accounts.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to critical identity and access management systems, especially those relying on WSO2 Identity Server for authentication and key management. The impersonation of users via reused FIDO credentials could compromise sensitive data, disrupt business processes, and potentially lead to privilege escalation if the new user account has elevated permissions. Although the CVSS score is low, the impact on confidentiality and integrity could be significant in environments where identity management is central to security. This is particularly concerning for sectors with strict regulatory requirements such as finance, healthcare, and government institutions in Europe, where identity compromise can lead to regulatory penalties and loss of trust. The vulnerability requires privileged attacker access and high attack complexity, which somewhat limits exploitation but does not eliminate risk, especially from insider threats or attackers who have already gained some level of access.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement the following specific measures: 1) Immediately audit and verify that user deletion processes also remove all associated FIDO registration data to prevent stale credentials from persisting. 2) Implement additional checks during user account creation to detect and prevent reuse of usernames that have associated FIDO credentials from deleted accounts. 3) Enforce strict account lifecycle management policies, ensuring that identity and authentication artifacts are fully purged upon account deletion. 4) Monitor authentication logs for anomalies such as unexpected FIDO authentications on newly created accounts with reused usernames. 5) Restrict privileged access to user management functions to minimize the risk of improper account deletions or creations. 6) Engage with WSO2 for patches or updates addressing this vulnerability and plan timely deployment once available. 7) Consider implementing multi-factor authentication methods that do not solely rely on FIDO credentials or adding additional verification steps for account re-creation scenarios. These steps go beyond generic advice by focusing on lifecycle management of authentication data and proactive detection of anomalous authentication events.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland
CVE-2025-0672: Vulnerability in WSO2 WSO2 Identity Server as Key Manager
Description
An authentication bypass vulnerability exists in multiple WSO2 products when FIDO authentication is enabled. When a user account is deleted, the system does not automatically remove associated FIDO registration data. If a new user account is later created using the same username, the system may associate the new account with the previously registered FIDO device. This flaw may allow a previously deleted user to authenticate using their FIDO credentials and impersonate the newly created user, resulting in unauthorized access. The vulnerability applies only to deployments that utilize FIDO-based authentication.
AI-Powered Analysis
Technical Analysis
CVE-2025-0672 is an authentication bypass vulnerability affecting WSO2 Identity Server when used as a Key Manager, specifically in version 5.10.0. The vulnerability arises in deployments that enable FIDO-based authentication. The core issue is that when a user account is deleted, the system fails to remove the associated FIDO registration data. Consequently, if a new user account is created with the same username as the deleted account, the system may incorrectly associate the new account with the old FIDO device registration. This flaw allows an attacker who previously had access to the deleted user account's FIDO credentials to authenticate as the new user, effectively impersonating them and gaining unauthorized access. The vulnerability is classified under CWE-287 (Improper Authentication). The CVSS v3.1 score is 3.3, indicating a low severity level, with the vector reflecting network attack vector (AV:N), high attack complexity (AC:H), requiring privileged attacker (PR:H), no user interaction (UI:N), unchanged scope (S:U), and low impact on confidentiality and integrity (C:L/I:L) with no impact on availability (A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is particularly relevant for organizations using WSO2 Identity Server as a Key Manager with FIDO authentication enabled, as it undermines the trust model of FIDO by allowing reuse of authentication credentials tied to deleted accounts.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to critical identity and access management systems, especially those relying on WSO2 Identity Server for authentication and key management. The impersonation of users via reused FIDO credentials could compromise sensitive data, disrupt business processes, and potentially lead to privilege escalation if the new user account has elevated permissions. Although the CVSS score is low, the impact on confidentiality and integrity could be significant in environments where identity management is central to security. This is particularly concerning for sectors with strict regulatory requirements such as finance, healthcare, and government institutions in Europe, where identity compromise can lead to regulatory penalties and loss of trust. The vulnerability requires privileged attacker access and high attack complexity, which somewhat limits exploitation but does not eliminate risk, especially from insider threats or attackers who have already gained some level of access.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement the following specific measures: 1) Immediately audit and verify that user deletion processes also remove all associated FIDO registration data to prevent stale credentials from persisting. 2) Implement additional checks during user account creation to detect and prevent reuse of usernames that have associated FIDO credentials from deleted accounts. 3) Enforce strict account lifecycle management policies, ensuring that identity and authentication artifacts are fully purged upon account deletion. 4) Monitor authentication logs for anomalies such as unexpected FIDO authentications on newly created accounts with reused usernames. 5) Restrict privileged access to user management functions to minimize the risk of improper account deletions or creations. 6) Engage with WSO2 for patches or updates addressing this vulnerability and plan timely deployment once available. 7) Consider implementing multi-factor authentication methods that do not solely rely on FIDO credentials or adding additional verification steps for account re-creation scenarios. These steps go beyond generic advice by focusing on lifecycle management of authentication data and proactive detection of anomalous authentication events.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WSO2
- Date Reserved
- 2025-01-23T13:38:31.988Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d2da7af7fe4c56f0792df1
Added to database: 9/23/2025, 5:35:54 PM
Last enriched: 10/1/2025, 12:38:10 AM
Last updated: 10/7/2025, 1:41:21 PM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.