Exploitation of this vulnerability could aid in brute-force attacks, targeted phishing campaigns, or other social engineering techniques by confirming the validity of user identifiers within the system.
Metrics
Affected Vendors & Products
Solution
Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3983/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3983/#solution
Workaround
No workaround given by the vendor.
Fri, 26 Sep 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-203 |
Fri, 26 Sep 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A username enumeration vulnerability exists in multiple WSO2 products when Multi-Attribute Login is enabled. In this configuration, the system returns a distinct "User does not exist" error message to the login form, regardless of the validate_username setting. This behavior allows malicious actors to determine which usernames exist in the system based on observable discrepancies in the application's responses. Exploitation of this vulnerability could aid in brute-force attacks, targeted phishing campaigns, or other social engineering techniques by confirming the validity of user identifiers within the system. | |
Title | Username Enumeration in Multiple WSO2 Products with Multi-Attribute Login Enabled | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: WSO2
Published:
Updated: 2025-09-26T08:19:45.872Z
Reserved: 2025-02-17T14:17:42.038Z
Link: CVE-2025-1396

No data.

Status : Awaiting Analysis
Published: 2025-09-26T08:15:38.040
Modified: 2025-09-26T14:32:19.853
Link: CVE-2025-1396

No data.

No data.