Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0672: Vulnerability in WSO2 WSO2 Identity Server as Key Manager

0
Low
VulnerabilityCVE-2025-0672cvecve-2025-0672
Published: Tue Sep 23 2025 (09/23/2025, 17:30:42 UTC)
Source: CVE Database V5
Vendor/Project: WSO2
Product: WSO2 Identity Server as Key Manager

Description

An authentication bypass vulnerability exists in multiple WSO2 products when FIDO authentication is enabled. When a user account is deleted, the system does not automatically remove associated FIDO registration data. If a new user account is later created using the same username, the system may associate the new account with the previously registered FIDO device. This flaw may allow a previously deleted user to authenticate using their FIDO credentials and impersonate the newly created user, resulting in unauthorized access. The vulnerability applies only to deployments that utilize FIDO-based authentication.

AI-Powered Analysis

AILast updated: 10/01/2025, 00:38:10 UTC

Technical Analysis

CVE-2025-0672 is an authentication bypass vulnerability affecting WSO2 Identity Server when used as a Key Manager, specifically in version 5.10.0. The vulnerability arises in deployments that enable FIDO-based authentication. The core issue is that when a user account is deleted, the system fails to remove the associated FIDO registration data. Consequently, if a new user account is created with the same username as the deleted account, the system may incorrectly associate the new account with the old FIDO device registration. This flaw allows an attacker who previously had access to the deleted user account's FIDO credentials to authenticate as the new user, effectively impersonating them and gaining unauthorized access. The vulnerability is classified under CWE-287 (Improper Authentication). The CVSS v3.1 score is 3.3, indicating a low severity level, with the vector reflecting network attack vector (AV:N), high attack complexity (AC:H), requiring privileged attacker (PR:H), no user interaction (UI:N), unchanged scope (S:U), and low impact on confidentiality and integrity (C:L/I:L) with no impact on availability (A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is particularly relevant for organizations using WSO2 Identity Server as a Key Manager with FIDO authentication enabled, as it undermines the trust model of FIDO by allowing reuse of authentication credentials tied to deleted accounts.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to critical identity and access management systems, especially those relying on WSO2 Identity Server for authentication and key management. The impersonation of users via reused FIDO credentials could compromise sensitive data, disrupt business processes, and potentially lead to privilege escalation if the new user account has elevated permissions. Although the CVSS score is low, the impact on confidentiality and integrity could be significant in environments where identity management is central to security. This is particularly concerning for sectors with strict regulatory requirements such as finance, healthcare, and government institutions in Europe, where identity compromise can lead to regulatory penalties and loss of trust. The vulnerability requires privileged attacker access and high attack complexity, which somewhat limits exploitation but does not eliminate risk, especially from insider threats or attackers who have already gained some level of access.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement the following specific measures: 1) Immediately audit and verify that user deletion processes also remove all associated FIDO registration data to prevent stale credentials from persisting. 2) Implement additional checks during user account creation to detect and prevent reuse of usernames that have associated FIDO credentials from deleted accounts. 3) Enforce strict account lifecycle management policies, ensuring that identity and authentication artifacts are fully purged upon account deletion. 4) Monitor authentication logs for anomalies such as unexpected FIDO authentications on newly created accounts with reused usernames. 5) Restrict privileged access to user management functions to minimize the risk of improper account deletions or creations. 6) Engage with WSO2 for patches or updates addressing this vulnerability and plan timely deployment once available. 7) Consider implementing multi-factor authentication methods that do not solely rely on FIDO credentials or adding additional verification steps for account re-creation scenarios. These steps go beyond generic advice by focusing on lifecycle management of authentication data and proactive detection of anomalous authentication events.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WSO2
Date Reserved
2025-01-23T13:38:31.988Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d2da7af7fe4c56f0792df1

Added to database: 9/23/2025, 5:35:54 PM

Last enriched: 10/1/2025, 12:38:10 AM

Last updated: 10/7/2025, 1:41:21 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats