The WPCOM Member plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.5. This is due to insufficient verification on the 'user_phone' parameter when logging in. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if SMS login is enabled.
Metrics
Affected Vendors & Products
References
History
Fri, 07 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 07 Mar 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WPCOM Member plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.5. This is due to insufficient verification on the 'user_phone' parameter when logging in. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if SMS login is enabled. | |
Title | WPCOM Member <= 1.7.5 - Authentication Bypass via 'user_phone' | |
Weaknesses | CWE-287 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-03-07T06:40:02.364Z
Updated: 2025-03-07T16:23:50.830Z
Reserved: 2025-02-19T16:29:36.050Z
Link: CVE-2025-1475

Updated: 2025-03-07T16:21:39.344Z

Status : Received
Published: 2025-03-07T07:15:23.343
Modified: 2025-03-07T07:15:23.343
Link: CVE-2025-1475

No data.