Home

Description

The WooCommerce OTP Login With Phone Number, OTP Verification plugin for WordPress is vulnerable to authentication bypass due to insufficient empty value checking in the lwp_ajax_register function in all versions up to, and including, 1.8.47. This makes it possible for unauthenticated attackers to bypass OTP verification and gain administrative access to any user account with a configured phone number by exploiting improper Firebase API error handling when the Firebase API key is not configured.

PUBLISHED Reserved 2025-07-30 | Published 2025-08-15 | Updated 2025-08-15 | Assigner Wordfence




HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

*
affected

Timeline

2025-07-18:Discovered
2025-08-01:Vendor Notified
2025-08-14:Disclosed

Credits

Arkadiusz Hydzik finder

References

www.wordfence.com/...-8e94-4cba-a3eb-0a823a5235ad?source=cve

plugins.trac.wordpress.org/....47/login-with-phonenumber.php

plugins.trac.wordpress.org/....47/login-with-phonenumber.php

plugins.trac.wordpress.org/...e-number&sfp_email=&sfph_mail=

cve.org (CVE-2025-8342)

nvd.nist.gov (CVE-2025-8342)

Download JSON