First published: Fri Mar 07 2025(Updated: )
The WPCOM Member plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.5. This is due to insufficient verification on the 'user_phone' parameter when logging in. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if SMS login is enabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress WPCOM Member | <=1.7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1475 is classified as a high severity vulnerability due to the potential for unauthorized access.
To fix CVE-2025-1475, update the WPCOM Member plugin to version 1.7.6 or later.
All users of the WPCOM Member plugin for WordPress versions up to and including 1.7.5 are affected by CVE-2025-1475.
CVE-2025-1475 is caused by insufficient verification of the 'user_phone' parameter during login attempts.
Yes, an attacker can exploit CVE-2025-1475 remotely without needing authentication.