The WooCommerce OTP Login With Phone Number, OTP Verification plugin for WordPress is vulnerable to authentication bypass due to insufficient empty value checking in the lwp_ajax_register function in all versions up to, and including, 1.8.47. This makes it possible for unauthenticated attackers to bypass OTP verification and gain administrative access to any user account with a configured phone number by exploiting improper Firebase API error handling when the Firebase API key is not configured.
Metrics
Affected Vendors & Products
References
History
Fri, 15 Aug 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 15 Aug 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WooCommerce OTP Login With Phone Number, OTP Verification plugin for WordPress is vulnerable to authentication bypass due to insufficient empty value checking in the lwp_ajax_register function in all versions up to, and including, 1.8.47. This makes it possible for unauthenticated attackers to bypass OTP verification and gain administrative access to any user account with a configured phone number by exploiting improper Firebase API error handling when the Firebase API key is not configured. | |
Title | WooCommerce OTP Login With Phone Number, OTP Verification <= 1.8.47 - Authentication Bypass | |
Weaknesses | CWE-862 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-08-15T02:24:22.094Z
Updated: 2025-08-15T12:44:28.348Z
Reserved: 2025-07-30T08:58:29.280Z
Link: CVE-2025-8342

Updated: 2025-08-15T12:44:24.187Z

Status : Awaiting Analysis
Published: 2025-08-15T03:15:36.877
Modified: 2025-08-15T13:12:51.217
Link: CVE-2025-8342

No data.