Description
The User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.46. This is due to the use of a loose PHP comparison operator to validate OTP codes in the "user_verification_form_wrap_process_otpLogin" function. This makes it possible for unauthenticated attackers to log in as any user with a verified email address, such as an administrator, by submitting a "true" OTP value.
Problem types
CWE-288 Authentication Bypass Using an Alternate Path or Channel
Product status
Any version
Timeline
| 2026-04-30: | Vendor Notified |
| 2026-05-01: | Disclosed |
Credits
Supanat Konprom
References
www.wordfence.com/...-8f68-4738-a9a8-76d0b7976165?source=cve
plugins.trac.wordpress.org/...form/hook.php#L164?rev=3461175
plugins.trac.wordpress.org/...ions-rest.php#L234?rev=3461175
plugins.trac.wordpress.org/...form/index.php#L71?rev=3461175
plugins.trac.wordpress.org/...eset/3519113/user-verification