Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7400 | The WPCOM Member plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.5. This is due to insufficient verification on the 'user_phone' parameter when logging in. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if SMS login is enabled. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 07 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 07 Mar 2025 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WPCOM Member plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.5. This is due to insufficient verification on the 'user_phone' parameter when logging in. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if SMS login is enabled. | |
| Title | WPCOM Member <= 1.7.5 - Authentication Bypass via 'user_phone' | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-03-07T16:23:50.830Z
Reserved: 2025-02-19T16:29:36.050Z
Link: CVE-2025-1475
Updated: 2025-03-07T16:21:39.344Z
Status : Received
Published: 2025-03-07T07:15:23.343
Modified: 2025-03-07T07:15:23.343
Link: CVE-2025-1475
No data.
OpenCVE Enrichment
No data.
EUVD