The WPCOM Member plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.5. This is due to insufficient verification on the 'user_phone' parameter when logging in. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if SMS login is enabled.
History

Fri, 07 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 07 Mar 2025 07:00:00 +0000

Type Values Removed Values Added
Description The WPCOM Member plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.5. This is due to insufficient verification on the 'user_phone' parameter when logging in. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if SMS login is enabled.
Title WPCOM Member <= 1.7.5 - Authentication Bypass via 'user_phone'
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-03-07T06:40:02.364Z

Updated: 2025-03-07T16:23:50.830Z

Reserved: 2025-02-19T16:29:36.050Z

Link: CVE-2025-1475

cve-icon Vulnrichment

Updated: 2025-03-07T16:21:39.344Z

cve-icon NVD

Status : Received

Published: 2025-03-07T07:15:23.343

Modified: 2025-03-07T07:15:23.343

Link: CVE-2025-1475

cve-icon Redhat

No data.