Home

Description

Due to a lack of user account state validation during authentication, locked user accounts can be successfully authenticated using Magic Link or Pass Key methods. This bypasses the intended security control that should prevent access to accounts that have been locked. This vulnerability may allow unauthorized access to applications and sensitive data associated with accounts that should have been restricted via the account lock mechanism. It also undermines the effectiveness of the account lock mechanism intended to prevent further login attempts.

PUBLISHED Reserved 2025-09-24 | Published 2026-05-11 | Updated 2026-05-11 | Assigner WSO2

Problem types

CWE-863: Incorrect Authorization

Product status

Default status
unaffected

Any version before 6.0.0
unknown

6.0.0 (custom) before 6.0.0.249
affected

6.1.0 (custom) before 6.1.0.248
affected

7.0.0 (custom) before 7.0.0.124
affected

7.1.0 (custom) before 7.1.0.31
affected

Default status
unknown

1.1.0 (custom) before 1.1.0.1
affected

1.1.5 (custom) before 1.1.5.2
affected

1.1.22 (custom) before 1.1.22.5
affected

1.1.31 (custom) before 1.1.31.2
affected

1.1.43 (custom)
unaffected

References

security.docs.wso2.com/...ty-advisories/2026/WSO2-2025-4388/ vendor-advisory

cve.org (CVE-2025-10908)

nvd.nist.gov (CVE-2025-10908)

Download JSON