Security Advisory WSO2-2025-4388/CVE-2025-10908¶
Published: 2026-01-26
Version: 1.0.0
Severity: N/A
CVSS Score: N/A
CVE IDs: CVE-2025-10908
AFFECTED PRODUCTS¶
- WSO2 Identity Server: 7.1.0, 7.0.0, 6.1.0, 6.0.0
OVERVIEW¶
Account lock bypass via Magic Link or Pass Key authentication.
DESCRIPTION¶
Due to lack of user account state validation, a locked user could successfully authenticate through the Magic Link or Pass Key authenticator, circumventing the intended security controls.
IMPACT¶
This vulnerability may allow unauthorized access to applications and sensitive data associated with accounts that should have been restricted via account lock mechanism. It also undermines the effectiveness of the account lock mechanism intended to prevent further login attempts.
SOLUTION¶
Community Users (Open Source)¶
Apply the relevant fixes to your product using the public fix(es) provided below.
- https://github.com/wso2-extensions/identity-local-auth-magiclink/pull/72
- https://github.com/wso2-extensions/identity-local-auth-magiclink/pull/74
- https://github.com/wso2/identity-apps/pull/9160
If applying the fix or update is not feasible, migrate to the latest unaffected version of the respective WSO2 product(s).
Support Subscription Holders¶
Update your product to the specified update level, or to a higher update level, to mitigate the identified vulnerability.
Info
WSO2 Support Subscription Holders may use WSO2 Updates in order to apply the fix.
| Product Name | Product Version | Update Level |
|---|---|---|
| WSO2 Identity Server | 7.1.0 | 31 |
| WSO2 Identity Server | 7.0.0 | 124 |
| WSO2 Identity Server | 6.1.0 | 248 |
| WSO2 Identity Server | 6.0.0 | 249 |