An authentication bypass vulnerability exists in multiple WSO2 products when FIDO authentication is enabled. When a user account is deleted, the system does not automatically remove associated FIDO registration data. If a new user account is later created using the same username, the system may associate the new account with the previously registered FIDO device. This flaw may allow a previously deleted user to authenticate using their FIDO credentials and impersonate the newly created user, resulting in unauthorized access. The vulnerability applies only to deployments that utilize FIDO-based authentication.
2025-09-23T18:15:30.863
2025-10-03T16:38:03.687
Analyzed
ed10eef1-636d-4fbe-9993-6890dfa878f8
CVSSv3.1: 3.3 (LOW)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | wso2 | identity_server | 5.10.0 | Yes |
| Application | wso2 | identity_server | 5.11.0 | Yes |
| Application | wso2 | identity_server_as_key_manager | 5.10.0 | Yes |
| Application | wso2 | open_banking_iam | 2.0.0 | Yes |