LOW · 3.3

CVE-2025-0672

An authentication bypass vulnerability exists in multiple WSO2 products when FIDO authentication is enabled. When a user account is deleted, the system does not automatically remove associated FIDO re...

Vulnerability Description

An authentication bypass vulnerability exists in multiple WSO2 products when FIDO authentication is enabled. When a user account is deleted, the system does not automatically remove associated FIDO registration data. If a new user account is later created using the same username, the system may associate the new account with the previously registered FIDO device. This flaw may allow a previously deleted user to authenticate using their FIDO credentials and impersonate the newly created user, resulting in unauthorized access. The vulnerability applies only to deployments that utilize FIDO-based authentication.

CVSS Score

3.3

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE

Affected Products

VendorProductVersions
Wso2Identity Server5.10.0
Wso2Identity Server As Key Manager5.10.0
Wso2Open Banking Iam2.0.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2025-0672?

CVE-2025-0672 is a vulnerability with a CVSS score of 3.3 (LOW). An authentication bypass vulnerability exists in multiple WSO2 products when FIDO authentication is enabled. When a user account is deleted, the system does not automatically remove associated FIDO re...

How severe is CVE-2025-0672?

CVE-2025-0672 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2025-0672?

Check the references section above for vendor advisories and patch information. Affected products include: Wso2 Identity Server, Wso2 Identity Server As Key Manager, Wso2 Open Banking Iam.