Vulnerability Description
An authentication bypass vulnerability exists in multiple WSO2 products when FIDO authentication is enabled. When a user account is deleted, the system does not automatically remove associated FIDO registration data. If a new user account is later created using the same username, the system may associate the new account with the previously registered FIDO device. This flaw may allow a previously deleted user to authenticate using their FIDO credentials and impersonate the newly created user, resulting in unauthorized access. The vulnerability applies only to deployments that utilize FIDO-based authentication.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wso2 | Identity Server | 5.10.0 |
| Wso2 | Identity Server As Key Manager | 5.10.0 |
| Wso2 | Open Banking Iam | 2.0.0 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2025-0672?
CVE-2025-0672 is a vulnerability with a CVSS score of 3.3 (LOW). An authentication bypass vulnerability exists in multiple WSO2 products when FIDO authentication is enabled. When a user account is deleted, the system does not automatically remove associated FIDO re...
How severe is CVE-2025-0672?
CVE-2025-0672 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-0672?
Check the references section above for vendor advisories and patch information. Affected products include: Wso2 Identity Server, Wso2 Identity Server As Key Manager, Wso2 Open Banking Iam.