Description
Due to a lack of user account state validation during authentication, locked user accounts can be successfully authenticated using Magic Link or Pass Key methods. This bypasses the intended security control that should prevent access to accounts that have been locked.

This vulnerability may allow unauthorized access to applications and sensitive data associated with accounts that should have been restricted via the account lock mechanism. It also undermines the effectiveness of the account lock mechanism intended to prevent further login attempts.
Published: 2026-05-11
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in WSO2 Identity Server’s authentication process results in the system overlooking the locked state of user accounts when Magic Link or Pass Key methods are used. This omission permits attackers who know a locked account identifier to authenticate as that account, thereby gaining unauthorized access to the associated applications and sensitive data that should have been prevented by the lock mechanism. Based on the description, it is inferred that an attacker would need to know the locked account’s username to perform the exploit. The vulnerability directly undermines the effectiveness of the account lock control and is classified as CWE‑863, reflecting improper verification of a host function’s output.

Affected Systems

The affected products are WSO2 Carbon MagicLink Authenticator Module and WSO2 Identity Server. Version information is not disclosed in the advisory, so all released builds of these components are potentially vulnerable until the recommended update is applied.

Risk and Exploitability

The CVSS score of 7.3 indicates a high severity vulnerability. The EPSS score is below 1%, suggesting a low probability of current exploitation. The vulnerability can be triggered remotely over the network using the legitimate Magic Link or Pass Key authentication flows, as inferred from the description that such methods are used for authentication. Although the issue is not listed in the CISA KEV catalog, the possibility of gaining unauthorized access to sensitive user data and applications makes the risk significant. The official WSO2 solution addresses the flaw by enforcing proper account state validation during authentication.

Generated by OpenCVE AI on May 11, 2026 at 23:08 UTC.

Remediation

Vendor Solution

Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2026/WSO2-2025-4388/#solution


OpenCVE Recommended Actions

  • Apply the latest WSO2 update by following the instructions in the security announcement located at https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2026/WSO2-2025-4388/#solution
  • If immediate patching is not possible, temporarily disable Magic Link and Pass Key authentication for locked accounts until the update is deployed
  • Monitor authentication logs for anomalous Magic Link or Pass Key login attempts involving locked accounts and investigate any suspicious activity

Generated by OpenCVE AI on May 11, 2026 at 23:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Wso2 identity Server
Vendors & Products Wso2 identity Server

Mon, 11 May 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}


Mon, 11 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description Due to a lack of user account state validation during authentication, locked user accounts can be successfully authenticated using Magic Link or Pass Key methods. This bypasses the intended security control that should prevent access to accounts that have been locked. This vulnerability may allow unauthorized access to applications and sensitive data associated with accounts that should have been restricted via the account lock mechanism. It also undermines the effectiveness of the account lock mechanism intended to prevent further login attempts.
Title Account Lock Bypass via Magic Link or Pass Key Authentication in WSO2 Identity Server Allows Unauthorized Access
First Time appeared Wso2
Wso2 wso2 Carbon Magiclink Authenticator Module
Wso2 wso2 Identity Server
Weaknesses CWE-863
CPEs cpe:2.3:a:wso2:wso2_carbon_magiclink_authenticator_module:*:*:*:*:*:*:*:*
cpe:2.3:a:wso2:wso2_identity_server:*:*:*:*:*:*:*:*
Vendors & Products Wso2
Wso2 wso2 Carbon Magiclink Authenticator Module
Wso2 wso2 Identity Server
References

Subscriptions

Wso2 Identity Server Wso2 Carbon Magiclink Authenticator Module Wso2 Identity Server
cve-icon MITRE

Status: PUBLISHED

Assigner: WSO2

Published:

Updated: 2026-05-11T18:38:02.953Z

Reserved: 2025-09-24T09:32:17.201Z

Link: CVE-2025-10908

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-11T10:16:12.590

Modified: 2026-05-11T20:23:28.213

Link: CVE-2025-10908

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T09:00:06Z

Weaknesses