This flaw may allow a previously deleted user to authenticate using their FIDO credentials and impersonate the newly created user, resulting in unauthorized access. The vulnerability applies only to deployments that utilize FIDO-based authentication.
Metrics
Affected Vendors & Products
Solution
Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3134/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3134/#solution
Workaround
No workaround given by the vendor.
Tue, 23 Sep 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An authentication bypass vulnerability exists in multiple WSO2 products when FIDO authentication is enabled. When a user account is deleted, the system does not automatically remove associated FIDO registration data. If a new user account is later created using the same username, the system may associate the new account with the previously registered FIDO device. This flaw may allow a previously deleted user to authenticate using their FIDO credentials and impersonate the newly created user, resulting in unauthorized access. The vulnerability applies only to deployments that utilize FIDO-based authentication. | |
Title | Authentication Bypass in Multiple WSO2 Products via Stale FIDO Credential Association | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2025-09-23T17:30:42.687Z
Reserved: 2025-01-23T13:38:31.988Z
Link: CVE-2025-0672

No data.

Status : Received
Published: 2025-09-23T18:15:30.863
Modified: 2025-09-23T18:15:30.863
Link: CVE-2025-0672

No data.

No data.