The Orion Login with SMS plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.5. This is due to the olws_handle_verify_phone() function not utilizing a strong enough OTP value, exposing the hash needed to generate the OTP value, and no restrictions on the number of attempts to submit the code. This makes it possible for unauthenticated attackers to log in as other users, including administrators, if they have access to their phone number.
Metrics
Affected Vendors & Products
References
History
Tue, 22 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 22 Jul 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Orion Login with SMS plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.5. This is due to the olws_handle_verify_phone() function not utilizing a strong enough OTP value, exposing the hash needed to generate the OTP value, and no restrictions on the number of attempts to submit the code. This makes it possible for unauthenticated attackers to log in as other users, including administrators, if they have access to their phone number. | |
| Title | Orion Login with SMS <= 1.0.5 - Authenticated Bypass via Weak OTP | |
| Weaknesses | CWE-288 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-07-22T09:22:42.768Z
Updated: 2025-07-22T13:20:49.176Z
Reserved: 2025-07-15T19:31:18.509Z
Link: CVE-2025-7692
Updated: 2025-07-22T13:20:40.984Z
Status : Awaiting Analysis
Published: 2025-07-22T10:15:26.357
Modified: 2025-07-22T13:05:40.573
Link: CVE-2025-7692
No data.