First published: Thu Oct 17 2024(Updated: )
The Miniorange OTP Verification with Firebase plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.6.0. This is due to missing validation on the token being supplied during the otp login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they know the phone number associated with that user.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Miniorange OTP Verification with Firebase WordPress | <3.6.1 | |
Miniorange OTP Verification with Firebase WordPress | <=3.6.0 |
https://plugins.trac.wordpress.org/changeset/3169869/miniorange-firebase-sms-otp-verification#file3
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9861 has a high severity level due to its potential for allowing authentication bypass.
To fix CVE-2024-9861, update the Miniorange OTP Verification with Firebase plugin to version 3.6.1 or later.
CVE-2024-9861 affects all versions of the Miniorange OTP Verification with Firebase plugin up to and including 3.6.0.
CVE-2024-9861 is an authentication bypass vulnerability affecting the Miniorange OTP Verification with Firebase plugin.
The vendor for CVE-2024-9861 is Miniorange, the creator of the OTP Verification with Firebase plugin for WordPress.