The check user account lock states feature within the email OTP flow fails to validate user input, allowing an attacker to infer the existence of registered user accounts.

The discovery of valid usernames can increase the risk of brute-force and social engineering attacks. Attackers can leverage this information to craft targeted phishing campaigns or other malicious activities aimed at tricking users into divulging sensitive data, potentially damaging the organization's reputation and leading to regulatory non-compliance and financial consequences.

Project Subscriptions

Vendors Products
Email Otp Authenticator Subscribe
Wso2 Carbon Authenticator Library For Emailotp Subscribe
Wso2 Identity Server Subscribe
Wso2 Identity Server As Key Manager Subscribe
Wso2 Open Banking Iam Subscribe
Advisories

No advisories yet.

Fixes

Solution

Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2026/WSO2-2024-3115/#solution


Workaround

No workaround given by the vendor.

History

Mon, 11 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description The check user account lock states feature within the email OTP flow fails to validate user input, allowing an attacker to infer the existence of registered user accounts. The discovery of valid usernames can increase the risk of brute-force and social engineering attacks. Attackers can leverage this information to craft targeted phishing campaigns or other malicious activities aimed at tricking users into divulging sensitive data, potentially damaging the organization's reputation and leading to regulatory non-compliance and financial consequences.
Title Username Enumeration via Email OTP Flow in Multiple WSO2 Products Allows User Account Discovery
First Time appeared Wso2
Wso2 email Otp Authenticator
Wso2 wso2 Carbon Authenticator Library For Emailotp
Wso2 wso2 Identity Server
Wso2 wso2 Identity Server As Key Manager
Wso2 wso2 Open Banking Iam
Weaknesses CWE-204
CPEs cpe:2.3:a:wso2:email_otp_authenticator:*:*:*:*:*:*:*:*
cpe:2.3:a:wso2:wso2_carbon_authenticator_library_for_emailotp:*:*:*:*:*:*:*:*
cpe:2.3:a:wso2:wso2_identity_server:*:*:*:*:*:*:*:*
cpe:2.3:a:wso2:wso2_identity_server_as_key_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:wso2:wso2_open_banking_iam:*:*:*:*:*:*:*:*
Vendors & Products Wso2
Wso2 email Otp Authenticator
Wso2 wso2 Carbon Authenticator Library For Emailotp
Wso2 wso2 Identity Server
Wso2 wso2 Identity Server As Key Manager
Wso2 wso2 Open Banking Iam
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: WSO2

Published:

Updated: 2026-05-11T12:46:03.691Z

Reserved: 2024-01-10T09:02:14.122Z

Link: CVE-2024-0391

cve-icon Vulnrichment

Updated: 2026-05-11T12:45:59.492Z

cve-icon NVD

Status : Received

Published: 2026-05-11T10:16:11.593

Modified: 2026-05-11T10:16:11.593

Link: CVE-2024-0391

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T17:15:40Z

Weaknesses