CVE-2024-0391
Username Enumeration in Email OTP Authentication
Publication date: 2026-05-11
Last updated on: 2026-05-11
Assigner: WSO2 LLC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wso2 | identity_server | 5.10.0 |
| wso2 | identity_server | 5.11.0 |
| wso2 | identity_server | 6.0.0 |
| wso2 | identity_server | 6.1.0 |
| wso2 | identity_server | 7.0.0 |
| wso2 | identity_server_as_key_manager | 5.10.0 |
| wso2 | open_banking_iam | 2.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-204 | The product provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor outside of the intended control sphere. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2024-0391 is a medium-severity vulnerability affecting multiple WSO2 products. It arises from a lack of validation in the email OTP (One-Time Password) flow, specifically in the feature that checks user account lock states. This flaw allows an attacker to perform username enumeration by determining which usernames are registered in the system.
By exploiting this vulnerability, an attacker can infer the existence of valid user accounts, which can then be used to increase the risk of brute-force attacks, social engineering, and information leakage.
How can this vulnerability impact me? :
The vulnerability can lead to several negative impacts including increased risk of brute-force attacks and social engineering attacks.
- Attackers can discover valid usernames, which helps them craft targeted phishing campaigns.
- This can result in users being tricked into divulging sensitive information.
- The organizationβs reputation may be damaged due to successful attacks.
- There may be regulatory non-compliance issues and financial consequences as a result.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability can lead to regulatory non-compliance because it increases the risk of unauthorized access and data breaches.
By allowing attackers to enumerate valid usernames and potentially conduct phishing or social engineering attacks, sensitive personal data could be exposed or compromised, which violates data protection standards such as GDPR and HIPAA.
Failure to protect user information adequately may result in legal and financial consequences under these regulations.
What immediate steps should I take to mitigate this vulnerability?
To mitigate CVE-2024-0391, it is recommended to update the affected WSO2 products to the specified fixed versions.
- Apply the fixes provided via the public GitHub pull request if you are a community user.
- Subscription holders should update their products to the specified update levels.
- If applying the fix is not feasible, migrate to the latest unaffected version of the respective WSO2 product.