Home

Description

The User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.46. This is due to the use of a loose PHP comparison operator to validate OTP codes in the "user_verification_form_wrap_process_otpLogin" function. This makes it possible for unauthenticated attackers to log in as any user with a verified email address, such as an administrator, by submitting a "true" OTP value.

PUBLISHED Reserved 2026-04-29 | Published 2026-05-02 | Updated 2026-05-04 | Assigner Wordfence




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-288 Authentication Bypass Using an Alternate Path or Channel

Product status

Default status
unaffected

Any version
affected

Timeline

2026-04-30:Vendor Notified
2026-05-01:Disclosed

Credits

Supanat Konprom finder

References

www.wordfence.com/...-8f68-4738-a9a8-76d0b7976165?source=cve

plugins.trac.wordpress.org/...form/hook.php#L164?rev=3461175

plugins.trac.wordpress.org/...ions-rest.php#L234?rev=3461175

plugins.trac.wordpress.org/...form/index.php#L71?rev=3461175

plugins.trac.wordpress.org/...eset/3519113/user-verification

cve.org (CVE-2026-7458)

nvd.nist.gov (CVE-2026-7458)

Download JSON