Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11178: CWE-288 Authentication Bypass Using an Alternate Path or Channel in india-web-developer Login With OTP

0
High
VulnerabilityCVE-2024-11178cvecve-2024-11178cwe-288
Published: Fri Dec 06 2024 (12/06/2024, 06:48:22 UTC)
Source: CVE Database V5
Vendor/Project: india-web-developer
Product: Login With OTP

Description

CVE-2024-11178 is a high-severity authentication bypass vulnerability in the WordPress plugin 'Login With OTP' by india-web-developer, affecting all versions up to 1. 4. 2. The plugin generates weak 6-digit numeric OTPs without enforcing attempt or time limits, enabling unauthenticated attackers to brute force OTPs and log in as any user, including administrators, if they can access the user's email. This flaw compromises confidentiality, integrity, and availability of affected WordPress sites. Exploitation requires no user interaction or privileges but has a high attack complexity due to brute forcing. No known exploits are currently reported in the wild. Organizations using this plugin should urgently update or implement strict OTP policies and monitoring to mitigate risk. Countries with significant WordPress usage and targeted sectors such as the US, India, UK, Germany, and Australia are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:41:33 UTC

Technical Analysis

CVE-2024-11178 is an authentication bypass vulnerability classified under CWE-288, affecting the 'Login With OTP' WordPress plugin developed by india-web-developer. The vulnerability arises because the plugin generates weak six-digit numeric one-time passwords (OTPs) without imposing any restrictions on the number of attempts or time limits for OTP validity. This design flaw allows unauthenticated attackers to perform brute force attacks against the OTP mechanism to gain unauthorized access to any existing user account on the WordPress site, including high-privilege administrator accounts, provided the attacker has access to the victim's email to receive OTPs. The vulnerability affects all versions up to and including 1.4.2. The CVSS v3.1 base score is 8.1 (high severity) with vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network attack vector, high attack complexity, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk due to the widespread use of WordPress and the plugin. The lack of OTP attempt limits and weak numeric OTPs make brute forcing feasible, especially if attackers can automate attempts and have access to the victim's email. This vulnerability can lead to complete site compromise, data theft, defacement, or further lateral attacks within the hosting environment.

Potential Impact

The impact of CVE-2024-11178 is severe for organizations relying on the 'Login With OTP' plugin for WordPress authentication. Successful exploitation allows attackers to bypass authentication controls and gain unauthorized access to any user account, including administrators, leading to full site compromise. This can result in data breaches exposing sensitive customer and business information, defacement or destruction of website content, installation of backdoors or malware, and disruption of services. The integrity and availability of the affected WordPress sites are at high risk. Organizations with public-facing WordPress sites using this plugin are particularly vulnerable to targeted attacks, automated brute force campaigns, and phishing-assisted attacks leveraging compromised email accounts. The absence of attempt limits exacerbates the risk by enabling attackers to persistently guess OTPs. This vulnerability undermines trust in the affected websites and can cause reputational damage and regulatory compliance issues, especially in sectors handling sensitive data such as finance, healthcare, and e-commerce.

Mitigation Recommendations

To mitigate CVE-2024-11178, organizations should immediately update the 'Login With OTP' plugin to a patched version once available. Until a patch is released, consider disabling the plugin or replacing it with alternative, more secure multi-factor authentication solutions. Implement strict rate limiting and lockout policies on OTP verification attempts to prevent brute force attacks. Enforce stronger OTP generation mechanisms, such as longer alphanumeric codes or time-based one-time passwords (TOTP) with limited validity periods. Monitor authentication logs for suspicious repeated OTP attempts and unusual login patterns. Ensure email accounts associated with user logins are secured with strong passwords and multi-factor authentication to prevent attackers from intercepting OTPs. Conduct regular security audits of WordPress installations and plugins to identify and remediate vulnerabilities promptly. Educate users about phishing risks and the importance of securing their email accounts. Network-level protections such as Web Application Firewalls (WAFs) can help detect and block brute force attempts targeting the OTP endpoint.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-11-13T13:33:17.977Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e07b7ef31ef0b593e4e

Added to database: 2/25/2026, 9:47:51 PM

Last enriched: 2/26/2026, 7:41:33 AM

Last updated: 2/26/2026, 9:15:17 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats