Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10484: CWE-288 Authentication Bypass Using an Alternate Path or Channel in FmeAddons Registration & Login with Mobile Phone Number for WooCommerce

0
Critical
VulnerabilityCVE-2025-10484cvecve-2025-10484cwe-288
Published: Sat Jan 17 2026 (01/17/2026, 08:24:30 UTC)
Source: CVE Database V5
Vendor/Project: FmeAddons
Product: Registration & Login with Mobile Phone Number for WooCommerce

Description

CVE-2025-10484 is a critical authentication bypass vulnerability in the Registration & Login with Mobile Phone Number for WooCommerce WordPress plugin (versions up to 1. 3. 1). The flaw arises because the plugin fails to properly verify user identity before authenticating via the fma_lwp_set_session_php_fun() function. This allows unauthenticated attackers to log in as any user, including administrators, without needing valid credentials. The vulnerability has a CVSS score of 9. 8, indicating a critical risk with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. Although no public exploits are known yet, the severity and ease of exploitation make this a significant threat to WooCommerce sites using this plugin. European organizations using this plugin are at high risk of account takeover and potential site compromise. Immediate patching or mitigation is essential to prevent unauthorized access and potential data breaches.

AI-Powered Analysis

AILast updated: 01/17/2026, 08:41:07 UTC

Technical Analysis

The vulnerability identified as CVE-2025-10484 affects the Registration & Login with Mobile Phone Number for WooCommerce plugin for WordPress, specifically all versions up to and including 1.3.1. The core issue is an authentication bypass (CWE-288) caused by improper verification of user identity before session establishment. The vulnerable function, fma_lwp_set_session_php_fun(), is responsible for setting the user session but does not adequately confirm that the user attempting to authenticate is legitimate. This flaw enables an unauthenticated attacker to bypass normal login procedures and gain access as any user on the site, including high-privilege administrator accounts, without supplying a valid password or any credentials. The vulnerability is remotely exploitable over the network without any user interaction or prior privileges, making it highly accessible to attackers. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with impacts rated high on confidentiality, integrity, and availability, meaning attackers can fully compromise the affected system. Although no known exploits have been publicly reported, the simplicity of exploitation and the widespread use of WooCommerce and its plugins suggest a high risk of future exploitation. The vulnerability poses a serious threat to the security of e-commerce websites relying on this plugin for user authentication via mobile phone numbers, potentially leading to unauthorized access, data theft, defacement, or further compromise of the hosting environment.

Potential Impact

For European organizations, this vulnerability presents a severe risk to e-commerce platforms using WooCommerce with the affected plugin. Unauthorized access to administrator accounts can lead to full site compromise, including theft of customer data, manipulation of orders, injection of malicious code, and disruption of services. This can result in significant financial losses, reputational damage, and non-compliance with GDPR and other data protection regulations due to unauthorized data exposure. The ease of exploitation and the critical impact on confidentiality, integrity, and availability make this vulnerability particularly dangerous. Organizations operating in sectors with high online transaction volumes, such as retail, finance, and healthcare, are especially vulnerable. The potential for attackers to impersonate legitimate users also increases the risk of fraudulent transactions and identity theft. Given the plugin’s role in authentication, exploitation could undermine trust in the entire e-commerce platform, affecting customer confidence and business continuity.

Mitigation Recommendations

Immediate mitigation involves updating the Registration & Login with Mobile Phone Number for WooCommerce plugin to a patched version once released by the vendor. Until a patch is available, organizations should consider disabling the plugin to prevent exploitation. Implementing additional authentication controls, such as multi-factor authentication (MFA), can reduce the risk of unauthorized access even if the vulnerability is exploited. Monitoring web server and application logs for unusual login activity or session anomalies can help detect exploitation attempts early. Restricting access to the WordPress admin area by IP whitelisting or VPN can limit attacker reach. Employing a Web Application Firewall (WAF) with custom rules to detect and block suspicious requests targeting the vulnerable function may provide temporary protection. Regular security audits and penetration testing focused on authentication mechanisms are recommended to identify and remediate similar issues proactively. Finally, educating site administrators about the risks and signs of compromise can improve incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-09-15T14:03:41.704Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696b47c6d302b072d9dc16e5

Added to database: 1/17/2026, 8:26:46 AM

Last enriched: 1/17/2026, 8:41:07 AM

Last updated: 1/17/2026, 11:18:46 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats