Impact
The User Verification plugin for WordPress is vulnerable to an authentication bypass that allows attackers to log in as any user with a verified email address, including administrators, by submitting an empty one‑time password. This flaw arises because the plugin does not verify that an OTP has actually been generated before comparing it to the input. As a result, the system accepts the empty value and grants access, effectively compromising the confidentiality and integrity of affected accounts.
Affected Systems
Any WordPress installation that uses the PickPlugins User Verification plugin version 2.0.44 or earlier is affected. The vulnerability exists in the user_verification_form_wrap_process_otpLogin function, and any site that enables OTP, magic login, or passwordless login features via this plugin is at risk.
Risk and Exploitability
The CVSS score of 9.8 indicates a critical severity, while the EPSS score of less than 1% suggests a low current exploitation probability. The vulnerability is not listed in CISA's KEV catalog, but its high severity means that once exploited it would allow full account takeover. The likely attack vector is a web‑based form submission with an empty OTP field, requiring no special privileges or sophisticated techniques beyond standard HTTP requests.
OpenCVE Enrichment