CVE-2025-12374

CRITICAL

WordPress User Verification <2.0.39 - Auth Bypass

Title source: llm
STIX 2.1

Description

The Email Verification, Email OTP, Block Spam Email, Passwordless login, Hide Login, Magic Login – User Verification plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.44. This is due to the plugin not properly validating that an OTP was generated before comparing it to user input in the "user_verification_form_wrap_process_otpLogin" function. This makes it possible for unauthenticated attackers to log in as any user with a verified email address, such as an administrator, by submitting an empty OTP value.

Scores

CVSS v3 9.8
EPSS 0.0056
EPSS Percentile 68.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-287
Status published
Products (2)
pickplugins/User Verification by PickPlugins < 2.0.39
pickplugins/User Verification by PickPlugins < 2.0.44
Published Dec 05, 2025
Tracked Since Feb 18, 2026