PT-2026-36569 · WordPress · User Verification
Supanat Konprom
·
Published
2026-05-02
·
Updated
2026-05-02
·
CVE-2026-7458
CVSS v3.1
9.8
Critical
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
User Verification by PickPlugins versions prior to 2.0.47
Description
The User Verification by PickPlugins plugin for WordPress allows unauthenticated attackers to log in as any user with a verified email address, including administrators. This occurs because the
user verification form wrap process otpLogin() function uses a loose PHP comparison operator to validate One-Time Password (OTP) codes, enabling bypass by submitting a "true" OTP value.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Authentication Bypass Using an Alternate Path or Channel
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
User Verification