PT-2026-36569 · WordPress · User Verification

Supanat Konprom

·

Published

2026-05-02

·

Updated

2026-05-02

·

CVE-2026-7458

CVSS v3.1

9.8

Critical

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions User Verification by PickPlugins versions prior to 2.0.47
Description The User Verification by PickPlugins plugin for WordPress allows unauthenticated attackers to log in as any user with a verified email address, including administrators. This occurs because the user verification form wrap process otpLogin() function uses a loose PHP comparison operator to validate One-Time Password (OTP) codes, enabling bypass by submitting a "true" OTP value.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Authentication Bypass Using an Alternate Path or Channel

Weakness Enumeration

Related Identifiers

CVE-2026-7458

Affected Products

User Verification