CVE-2025-9973 — Privilege Escalation

CVE-2025-9973 — Privilege Escalation

CVE-2025-9973 — Due to not validating the organization context when executing adaptive authentication flows, the WSO2 Identity Server allows adaptive authentication logic to be triggered on unintended organizations. A malicious actor with privileges to configure adaptive authentication within one or

What This Means For You

  • If your environment is affected by this vulnerability type, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2025-9973 updates and patches.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1068 Privilege Escalation

WSO2 Identity Server - Adaptive Authentication Bypass (CVE-2025-9973)

Sigma YAML — free preview
title: WSO2 Identity Server - Adaptive Authentication Bypass (CVE-2025-9973)
id: scw-2026-05-11-ai-1
status: experimental
level: critical
description: |
  Detects requests to WSO2 Identity Server that attempt to leverage the adaptive authentication flow across different organizations, indicating a potential exploitation of CVE-2025-9973. This rule specifically looks for the '/t/organizations/' path combined with 'adaptive-auth' in the query string, which is characteristic of the vulnerability allowing authentication logic to be triggered on unintended organizations.
author: SCW Feed Engine (AI-generated)
date: 2026-05-11
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2025-9973/
tags:
  - attack.privilege_escalation
  - attack.t1068
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/t/organizations/'
      cs-uri-query|contains:
          - 'adaptive-auth'
      sc-status:
          - 200
  condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2025-9973 vulnerability CVE-2025-9973
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 11, 2026 at 15:16 UTC

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-8290 — Open5GS Denial of Service

CVE-2026-8290 — A security flaw has been discovered in Open5GS up to 2.7.7. This issue affects the function smf_nsmf_handle_update_data_in_vsmf of the file /src/smf/nsmf-handler.c of the...

vulnerabilityCVEmedium-severitydenial-of-servicecwe-404
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-8289 — Open5GS Denial of Service

CVE-2026-8289 — A vulnerability was identified in Open5GS up to 2.7.7. This vulnerability affects the function smf_nsmf_handle_update_data_in_vsmf of the file /src/smf/nsmf-handler.c of the component SMF....

vulnerabilityCVEmedium-severitydenial-of-servicecwe-404
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 2 Sigma

Cockpit CVE-2026-4802: Remote Command Execution via Unsanitized Logs

CVE-2026-4802 — A flaw was found in Cockpit. This vulnerability allows a remote attacker to achieve arbitrary command execution on the host by exploiting unsanitized...

vulnerabilityCVEhigh-severitycwe-78
/SCW Vulnerability Desk /HIGH /8 /⚑ 3 IOCs /⚙ 3 Sigma