CVE-2025-10908
Account Lock Bypass via Magic Link or Pass Key Authentication in WSO2 Identity Server Allows Unauthorized Access
CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th
Due to a lack of user account state validation during authentication, locked user accounts can be successfully authenticated using Magic Link or Pass Key methods. This bypasses the intended security control that should prevent access to accounts that have been locked. This vulnerability may allow unauthorized access to applications and sensitive data associated with accounts that should have been restricted via the account lock mechanism. It also undermines the effectiveness of the account lock mechanism intended to prevent further login attempts.
| CWE | CWE-863 |
| Vendor | wso2 |
| Product | wso2 identity server |
| Published | May 11, 2026 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for wso2 wso2 identity server
Be the first to know when new high vulnerabilities affecting wso2 wso2 identity server are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
WSO2 / WSO2 Identity Server
6.0.0 < 6.0.0.249 6.1.0 < 6.1.0.248 7.0.0 < 7.0.0.124 7.1.0 < 7.1.0.31
WSO2 / WSO2 Carbon MagicLink Authenticator Module
1.1.0 < 1.1.0.1 1.1.5 < 1.1.5.2 1.1.22 < 1.1.22.5 1.1.31 < 1.1.31.2