Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9862: CWE-639 Authorization Bypass Through User-Controlled Key in cyberlord92 Miniorange OTP Verification with Firebase

0
Critical
VulnerabilityCVE-2024-9862cvecve-2024-9862cwe-639
Published: Thu Oct 17 2024 (10/17/2024, 02:06:03 UTC)
Source: CVE Database V5
Vendor/Project: cyberlord92
Product: Miniorange OTP Verification with Firebase

Description

CVE-2024-9862 is a critical authorization bypass vulnerability in the Miniorange OTP Verification with Firebase WordPress plugin (up to version 3. 6. 0). It allows unauthenticated attackers to change any user's password without verifying the current password, due to user-controlled access to objects and missing password checks. This flaw enables attackers to potentially take over administrator accounts, compromising site confidentiality, integrity, and availability. The vulnerability has a CVSS score of 9. 8, reflecting its ease of exploitation and severe impact. No known exploits are currently reported in the wild. Organizations using this plugin should urgently update or apply mitigations to prevent unauthorized account takeover.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:43:12 UTC

Technical Analysis

The Miniorange OTP Verification with Firebase plugin for WordPress, developed by cyberlord92, suffers from a critical authorization bypass vulnerability identified as CVE-2024-9862. This vulnerability arises from improper access control mechanisms where user-controlled keys allow bypassing authorization checks. Specifically, the plugin fails to verify the current password when processing password change requests, enabling unauthenticated attackers to arbitrarily change any user's password. The root cause is linked to CWE-639 (Authorization Bypass Through User-Controlled Key), where the plugin exposes system resources to unauthorized users due to insufficient validation of user input and access rights. This flaw affects all versions up to and including 3.6.0. Exploiting this vulnerability requires no authentication or user interaction, making it highly accessible to remote attackers. Successful exploitation can lead to full account takeover, including administrator accounts, resulting in complete compromise of the WordPress site. The vulnerability has been assigned a CVSS v3.1 base score of 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits are currently known, the high severity and ease of exploitation make it a significant threat to WordPress sites using this plugin.

Potential Impact

The impact of CVE-2024-9862 is severe for organizations using the Miniorange OTP Verification with Firebase plugin. Attackers can gain unauthorized access to user accounts by changing passwords without authentication, potentially leading to full site compromise. Administrator accounts are at risk, which can result in attackers installing backdoors, stealing sensitive data, defacing websites, or disrupting services. This undermines confidentiality, integrity, and availability of affected WordPress sites. Given WordPress's widespread use globally, this vulnerability poses a significant risk to websites ranging from small businesses to large enterprises. The ease of exploitation and lack of required privileges mean attackers can quickly leverage this flaw for mass account takeovers or targeted attacks. Organizations relying on this plugin for OTP verification and authentication are particularly vulnerable to identity theft, data breaches, and operational disruptions.

Mitigation Recommendations

To mitigate CVE-2024-9862, organizations should immediately update the Miniorange OTP Verification with Firebase plugin to a patched version once released by the vendor. Until a patch is available, consider disabling the plugin or replacing it with alternative OTP verification solutions that have proper authorization controls. Implement strict access controls and monitor logs for suspicious password change attempts. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized password change requests targeting this plugin's endpoints. Additionally, enforce multi-factor authentication (MFA) at the WordPress login level independent of the plugin to reduce risk of account takeover. Regularly audit user accounts for unauthorized changes and maintain backups to enable recovery from compromise. Engage with the plugin vendor for timely updates and verify that future versions include robust authorization checks and password verification mechanisms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-10-11T12:45:59.762Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b61b7ef31ef0b554d4c

Added to database: 2/25/2026, 9:36:33 PM

Last enriched: 2/25/2026, 11:43:12 PM

Last updated: 2/26/2026, 7:28:49 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats