CVE-2025-12374
CRITICALWordPress User Verification <2.0.39 - Auth Bypass
Title source: llmDescription
The Email Verification, Email OTP, Block Spam Email, Passwordless login, Hide Login, Magic Login – User Verification plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.44. This is due to the plugin not properly validating that an OTP was generated before comparing it to user input in the "user_verification_form_wrap_process_otpLogin" function. This makes it possible for unauthenticated attackers to log in as any user with a verified email address, such as an administrator, by submitting an empty OTP value.
References (3)
Scores
CVSS v3
9.8
EPSS
0.0056
EPSS Percentile
68.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-287
Status
published
Products (2)
pickplugins/User Verification by PickPlugins
< 2.0.39
pickplugins/User Verification by PickPlugins
< 2.0.44
Published
Dec 05, 2025
Tracked Since
Feb 18, 2026