CVE-2025-0672: Vulnerability in WSO2 WSO2 Identity Server as Key Manager
An authentication bypass vulnerability exists in multiple WSO2 products when FIDO authentication is enabled. When a user account is deleted, the system does not automatically remove associated FIDO registration data. If a new user account is later created using the same username, the system may associate the new account with the previously registered FIDO device. This flaw may allow a previously deleted user to authenticate using their FIDO credentials and impersonate the newly created user, resulting in unauthorized access. The vulnerability applies only to deployments that utilize FIDO-based authentication.
AI Analysis
Technical Summary
CVE-2025-0672 is an authentication bypass vulnerability affecting WSO2 Identity Server when used as a Key Manager, specifically in version 5.10.0. The vulnerability arises in deployments that enable FIDO-based authentication. The core issue is that when a user account is deleted, the system fails to remove the associated FIDO registration data. Consequently, if a new user account is created with the same username as the deleted account, the system may incorrectly associate the new account with the old FIDO device registration. This flaw allows an attacker who previously had access to the deleted user account's FIDO credentials to authenticate as the new user, effectively impersonating them and gaining unauthorized access. The vulnerability is classified under CWE-287 (Improper Authentication). The CVSS v3.1 score is 3.3, indicating a low severity level, with the vector reflecting network attack vector (AV:N), high attack complexity (AC:H), requiring privileged attacker (PR:H), no user interaction (UI:N), unchanged scope (S:U), and low impact on confidentiality and integrity (C:L/I:L) with no impact on availability (A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is particularly relevant for organizations using WSO2 Identity Server as a Key Manager with FIDO authentication enabled, as it undermines the trust model of FIDO by allowing reuse of authentication credentials tied to deleted accounts.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to critical identity and access management systems, especially those relying on WSO2 Identity Server for authentication and key management. The impersonation of users via reused FIDO credentials could compromise sensitive data, disrupt business processes, and potentially lead to privilege escalation if the new user account has elevated permissions. Although the CVSS score is low, the impact on confidentiality and integrity could be significant in environments where identity management is central to security. This is particularly concerning for sectors with strict regulatory requirements such as finance, healthcare, and government institutions in Europe, where identity compromise can lead to regulatory penalties and loss of trust. The vulnerability requires privileged attacker access and high attack complexity, which somewhat limits exploitation but does not eliminate risk, especially from insider threats or attackers who have already gained some level of access.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement the following specific measures: 1) Immediately audit and verify that user deletion processes also remove all associated FIDO registration data to prevent stale credentials from persisting. 2) Implement additional checks during user account creation to detect and prevent reuse of usernames that have associated FIDO credentials from deleted accounts. 3) Enforce strict account lifecycle management policies, ensuring that identity and authentication artifacts are fully purged upon account deletion. 4) Monitor authentication logs for anomalies such as unexpected FIDO authentications on newly created accounts with reused usernames. 5) Restrict privileged access to user management functions to minimize the risk of improper account deletions or creations. 6) Engage with WSO2 for patches or updates addressing this vulnerability and plan timely deployment once available. 7) Consider implementing multi-factor authentication methods that do not solely rely on FIDO credentials or adding additional verification steps for account re-creation scenarios. These steps go beyond generic advice by focusing on lifecycle management of authentication data and proactive detection of anomalous authentication events.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland
CVE-2025-0672: Vulnerability in WSO2 WSO2 Identity Server as Key Manager
Description
An authentication bypass vulnerability exists in multiple WSO2 products when FIDO authentication is enabled. When a user account is deleted, the system does not automatically remove associated FIDO registration data. If a new user account is later created using the same username, the system may associate the new account with the previously registered FIDO device. This flaw may allow a previously deleted user to authenticate using their FIDO credentials and impersonate the newly created user, resulting in unauthorized access. The vulnerability applies only to deployments that utilize FIDO-based authentication.
AI-Powered Analysis
Technical Analysis
CVE-2025-0672 is an authentication bypass vulnerability affecting WSO2 Identity Server when used as a Key Manager, specifically in version 5.10.0. The vulnerability arises in deployments that enable FIDO-based authentication. The core issue is that when a user account is deleted, the system fails to remove the associated FIDO registration data. Consequently, if a new user account is created with the same username as the deleted account, the system may incorrectly associate the new account with the old FIDO device registration. This flaw allows an attacker who previously had access to the deleted user account's FIDO credentials to authenticate as the new user, effectively impersonating them and gaining unauthorized access. The vulnerability is classified under CWE-287 (Improper Authentication). The CVSS v3.1 score is 3.3, indicating a low severity level, with the vector reflecting network attack vector (AV:N), high attack complexity (AC:H), requiring privileged attacker (PR:H), no user interaction (UI:N), unchanged scope (S:U), and low impact on confidentiality and integrity (C:L/I:L) with no impact on availability (A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is particularly relevant for organizations using WSO2 Identity Server as a Key Manager with FIDO authentication enabled, as it undermines the trust model of FIDO by allowing reuse of authentication credentials tied to deleted accounts.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to critical identity and access management systems, especially those relying on WSO2 Identity Server for authentication and key management. The impersonation of users via reused FIDO credentials could compromise sensitive data, disrupt business processes, and potentially lead to privilege escalation if the new user account has elevated permissions. Although the CVSS score is low, the impact on confidentiality and integrity could be significant in environments where identity management is central to security. This is particularly concerning for sectors with strict regulatory requirements such as finance, healthcare, and government institutions in Europe, where identity compromise can lead to regulatory penalties and loss of trust. The vulnerability requires privileged attacker access and high attack complexity, which somewhat limits exploitation but does not eliminate risk, especially from insider threats or attackers who have already gained some level of access.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement the following specific measures: 1) Immediately audit and verify that user deletion processes also remove all associated FIDO registration data to prevent stale credentials from persisting. 2) Implement additional checks during user account creation to detect and prevent reuse of usernames that have associated FIDO credentials from deleted accounts. 3) Enforce strict account lifecycle management policies, ensuring that identity and authentication artifacts are fully purged upon account deletion. 4) Monitor authentication logs for anomalies such as unexpected FIDO authentications on newly created accounts with reused usernames. 5) Restrict privileged access to user management functions to minimize the risk of improper account deletions or creations. 6) Engage with WSO2 for patches or updates addressing this vulnerability and plan timely deployment once available. 7) Consider implementing multi-factor authentication methods that do not solely rely on FIDO credentials or adding additional verification steps for account re-creation scenarios. These steps go beyond generic advice by focusing on lifecycle management of authentication data and proactive detection of anomalous authentication events.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WSO2
- Date Reserved
- 2025-01-23T13:38:31.988Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d2da7af7fe4c56f0792df1
Added to database: 9/23/2025, 5:35:54 PM
Last enriched: 10/1/2025, 12:38:10 AM
Last updated: 1/7/2026, 6:08:50 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.