CVE-2025-10484: CWE-288 Authentication Bypass Using an Alternate Path or Channel in FmeAddons Registration & Login with Mobile Phone Number for WooCommerce
CVE-2025-10484 is a critical authentication bypass vulnerability in the Registration & Login with Mobile Phone Number for WooCommerce WordPress plugin (versions up to 1. 3. 1). The flaw arises because the plugin fails to properly verify user identity before authenticating via the fma_lwp_set_session_php_fun() function. This allows unauthenticated attackers to log in as any user, including administrators, without needing valid credentials. The vulnerability has a CVSS score of 9. 8, indicating a critical risk with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. Although no public exploits are known yet, the severity and ease of exploitation make this a significant threat to WooCommerce sites using this plugin. European organizations using this plugin are at high risk of account takeover and potential site compromise. Immediate patching or mitigation is essential to prevent unauthorized access and potential data breaches.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-10484 affects the Registration & Login with Mobile Phone Number for WooCommerce plugin for WordPress, specifically all versions up to and including 1.3.1. The core issue is an authentication bypass (CWE-288) caused by improper verification of user identity before session establishment. The vulnerable function, fma_lwp_set_session_php_fun(), is responsible for setting the user session but does not adequately confirm that the user attempting to authenticate is legitimate. This flaw enables an unauthenticated attacker to bypass normal login procedures and gain access as any user on the site, including high-privilege administrator accounts, without supplying a valid password or any credentials. The vulnerability is remotely exploitable over the network without any user interaction or prior privileges, making it highly accessible to attackers. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with impacts rated high on confidentiality, integrity, and availability, meaning attackers can fully compromise the affected system. Although no known exploits have been publicly reported, the simplicity of exploitation and the widespread use of WooCommerce and its plugins suggest a high risk of future exploitation. The vulnerability poses a serious threat to the security of e-commerce websites relying on this plugin for user authentication via mobile phone numbers, potentially leading to unauthorized access, data theft, defacement, or further compromise of the hosting environment.
Potential Impact
For European organizations, this vulnerability presents a severe risk to e-commerce platforms using WooCommerce with the affected plugin. Unauthorized access to administrator accounts can lead to full site compromise, including theft of customer data, manipulation of orders, injection of malicious code, and disruption of services. This can result in significant financial losses, reputational damage, and non-compliance with GDPR and other data protection regulations due to unauthorized data exposure. The ease of exploitation and the critical impact on confidentiality, integrity, and availability make this vulnerability particularly dangerous. Organizations operating in sectors with high online transaction volumes, such as retail, finance, and healthcare, are especially vulnerable. The potential for attackers to impersonate legitimate users also increases the risk of fraudulent transactions and identity theft. Given the plugin’s role in authentication, exploitation could undermine trust in the entire e-commerce platform, affecting customer confidence and business continuity.
Mitigation Recommendations
Immediate mitigation involves updating the Registration & Login with Mobile Phone Number for WooCommerce plugin to a patched version once released by the vendor. Until a patch is available, organizations should consider disabling the plugin to prevent exploitation. Implementing additional authentication controls, such as multi-factor authentication (MFA), can reduce the risk of unauthorized access even if the vulnerability is exploited. Monitoring web server and application logs for unusual login activity or session anomalies can help detect exploitation attempts early. Restricting access to the WordPress admin area by IP whitelisting or VPN can limit attacker reach. Employing a Web Application Firewall (WAF) with custom rules to detect and block suspicious requests targeting the vulnerable function may provide temporary protection. Regular security audits and penetration testing focused on authentication mechanisms are recommended to identify and remediate similar issues proactively. Finally, educating site administrators about the risks and signs of compromise can improve incident response readiness.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10484: CWE-288 Authentication Bypass Using an Alternate Path or Channel in FmeAddons Registration & Login with Mobile Phone Number for WooCommerce
Description
CVE-2025-10484 is a critical authentication bypass vulnerability in the Registration & Login with Mobile Phone Number for WooCommerce WordPress plugin (versions up to 1. 3. 1). The flaw arises because the plugin fails to properly verify user identity before authenticating via the fma_lwp_set_session_php_fun() function. This allows unauthenticated attackers to log in as any user, including administrators, without needing valid credentials. The vulnerability has a CVSS score of 9. 8, indicating a critical risk with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. Although no public exploits are known yet, the severity and ease of exploitation make this a significant threat to WooCommerce sites using this plugin. European organizations using this plugin are at high risk of account takeover and potential site compromise. Immediate patching or mitigation is essential to prevent unauthorized access and potential data breaches.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-10484 affects the Registration & Login with Mobile Phone Number for WooCommerce plugin for WordPress, specifically all versions up to and including 1.3.1. The core issue is an authentication bypass (CWE-288) caused by improper verification of user identity before session establishment. The vulnerable function, fma_lwp_set_session_php_fun(), is responsible for setting the user session but does not adequately confirm that the user attempting to authenticate is legitimate. This flaw enables an unauthenticated attacker to bypass normal login procedures and gain access as any user on the site, including high-privilege administrator accounts, without supplying a valid password or any credentials. The vulnerability is remotely exploitable over the network without any user interaction or prior privileges, making it highly accessible to attackers. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with impacts rated high on confidentiality, integrity, and availability, meaning attackers can fully compromise the affected system. Although no known exploits have been publicly reported, the simplicity of exploitation and the widespread use of WooCommerce and its plugins suggest a high risk of future exploitation. The vulnerability poses a serious threat to the security of e-commerce websites relying on this plugin for user authentication via mobile phone numbers, potentially leading to unauthorized access, data theft, defacement, or further compromise of the hosting environment.
Potential Impact
For European organizations, this vulnerability presents a severe risk to e-commerce platforms using WooCommerce with the affected plugin. Unauthorized access to administrator accounts can lead to full site compromise, including theft of customer data, manipulation of orders, injection of malicious code, and disruption of services. This can result in significant financial losses, reputational damage, and non-compliance with GDPR and other data protection regulations due to unauthorized data exposure. The ease of exploitation and the critical impact on confidentiality, integrity, and availability make this vulnerability particularly dangerous. Organizations operating in sectors with high online transaction volumes, such as retail, finance, and healthcare, are especially vulnerable. The potential for attackers to impersonate legitimate users also increases the risk of fraudulent transactions and identity theft. Given the plugin’s role in authentication, exploitation could undermine trust in the entire e-commerce platform, affecting customer confidence and business continuity.
Mitigation Recommendations
Immediate mitigation involves updating the Registration & Login with Mobile Phone Number for WooCommerce plugin to a patched version once released by the vendor. Until a patch is available, organizations should consider disabling the plugin to prevent exploitation. Implementing additional authentication controls, such as multi-factor authentication (MFA), can reduce the risk of unauthorized access even if the vulnerability is exploited. Monitoring web server and application logs for unusual login activity or session anomalies can help detect exploitation attempts early. Restricting access to the WordPress admin area by IP whitelisting or VPN can limit attacker reach. Employing a Web Application Firewall (WAF) with custom rules to detect and block suspicious requests targeting the vulnerable function may provide temporary protection. Regular security audits and penetration testing focused on authentication mechanisms are recommended to identify and remediate similar issues proactively. Finally, educating site administrators about the risks and signs of compromise can improve incident response readiness.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-15T14:03:41.704Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696b47c6d302b072d9dc16e5
Added to database: 1/17/2026, 8:26:46 AM
Last enriched: 1/17/2026, 8:41:07 AM
Last updated: 1/17/2026, 11:18:46 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15530: Reachable Assertion in Open5GS
MediumCVE-2026-0725: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cyberlord92 Integrate Dynamics 365 CRM
MediumCVE-2025-8615: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cubewp1211 CubeWP Framework
MediumCVE-2025-14078: CWE-862 Missing Authorization in shoheitanaka PAYGENT for WooCommerce
MediumCVE-2025-14478: CWE-611 Improper Restriction of XML External Entity Reference in kraftplugins Demo Importer Plus
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.