Description
The Service Finder SMS System plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.0. This is due to the plugin not verifying a user's phone number before logging them in. This makes it possible for unauthenticated attackers to login as arbitrary users.
Published: 2025-09-19
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Patch Immediately
AI Analysis

Impact

The Service Finder SMS System plugin for WordPress allows attackers to gain authentication privileges without providing valid credentials because the plugin fails to validate a user's phone number before logging them in. This flaw enables an unauthenticated adversary to assume the identity of any user, potentially accessing sensitive data, modifying content, or conducting further exploits. The weakness corresponds to CWE-288, which signals improper authorization logic.

Affected Systems

The vulnerability affects the AoneTheme Service Finder SMS System plugin for WordPress in all releases up to and including version 2.0.0. No information is provided about partial mitigation in newer releases, so administrators should assume that earlier versions remain susceptible.

Risk and Exploitability

The CVSS score of 8.1 indicates a high‑severity risk. EPSS is reported as less than 1%, suggesting that while exploitation is possible, the probability of widespread attacks is currently low. The flaw is not listed in the CISA KEV catalog. The likely attack vector is a web‑based request to the plugin’s authentication endpoint, which can be triggered by any user with network access to the WordPress site.

Generated by OpenCVE AI on April 20, 2026 at 19:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Service Finder SMS System to a version newer than 2.0.0.
  • If an upgrade is not immediately possible, block or remove the plugin’s authentication endpoint from the web server or firewall to prevent unauthenticated access.
  • Disable any auto‑login or phone validation features through the plugin’s settings as a temporary workaround.

Generated by OpenCVE AI on April 20, 2026 at 19:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-30232 The Service Finder SMS System plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.0. This is due to the plugin not verifying a user's phone number before logging them in. This makes it possible for unauthenticated attackers to login as arbitrary users.
History

Fri, 19 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 19 Sep 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Aonetheme
Aonetheme service Finder Sms System
Wordpress
Wordpress wordpress
Vendors & Products Aonetheme
Aonetheme service Finder Sms System
Wordpress
Wordpress wordpress

Fri, 19 Sep 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Service Finder SMS System plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.0. This is due to the plugin not verifying a user's phone number before logging them in. This makes it possible for unauthenticated attackers to login as arbitrary users.
Title Service Finder SMS System <= 2.0.0 - Authentication Bypass
Weaknesses CWE-288
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Aonetheme Service Finder Sms System
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:23:42.395Z

Reserved: 2025-06-09T19:25:00.411Z

Link: CVE-2025-5955

cve-icon Vulnrichment

Updated: 2025-09-19T13:30:47.090Z

cve-icon NVD

Status : Deferred

Published: 2025-09-19T05:15:33.603

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-5955

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T19:45:15Z

Weaknesses