Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12374: CWE-287 Improper Authentication in pickplugins User Verification by PickPlugins

0
Critical
VulnerabilityCVE-2025-12374cvecve-2025-12374cwe-287
Published: Fri Dec 05 2025 (12/05/2025, 06:07:19 UTC)
Source: CVE Database V5
Vendor/Project: pickplugins
Product: User Verification by PickPlugins

Description

CVE-2025-12374 is a critical authentication bypass vulnerability in the WordPress plugin 'User Verification by PickPlugins' affecting all versions up to 2. 0. 39. The flaw arises because the plugin fails to verify that a one-time password (OTP) was actually generated before comparing it to user input, allowing attackers to bypass authentication by submitting an empty OTP. This enables unauthenticated attackers to log in as any user with a verified email address, including administrators, leading to full compromise of the affected WordPress site. The vulnerability has a CVSS score of 9. 8, reflecting its high impact on confidentiality, integrity, and availability without requiring user interaction or privileges. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make this a critical threat. European organizations using this plugin on WordPress sites should urgently apply patches or implement mitigations to prevent unauthorized access. Countries with high WordPress adoption and significant use of this plugin, such as Germany, the UK, France, and the Netherlands, are particularly at risk.

AI-Powered Analysis

AILast updated: 12/05/2025, 06:45:15 UTC

Technical Analysis

CVE-2025-12374 is an authentication bypass vulnerability classified under CWE-287 affecting the 'User Verification by PickPlugins' WordPress plugin, specifically versions up to and including 2.0.39. The vulnerability stems from improper validation logic within the 'user_verification_form_wrap_process_otpLogin' function, where the plugin does not confirm that an OTP was generated before comparing the input OTP value. This logical flaw allows an attacker to submit an empty OTP value and bypass the authentication process entirely. Consequently, an unauthenticated attacker can impersonate any user with a verified email address, including high-privilege accounts such as administrators. The vulnerability is remotely exploitable over the network without any authentication or user interaction, making it highly dangerous. The CVSS v3.1 base score of 9.8 reflects its criticality, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the simplicity of the bypass and the widespread use of WordPress and this plugin increase the likelihood of exploitation. The lack of available patches at the time of publication further exacerbates the risk.

Potential Impact

For European organizations, this vulnerability poses a severe risk to WordPress-based websites and web applications that utilize the affected plugin. Successful exploitation results in full compromise of user accounts, including administrators, enabling attackers to execute arbitrary actions such as data theft, website defacement, malware deployment, or pivoting to internal networks. This can lead to significant data breaches, loss of customer trust, regulatory penalties under GDPR, and operational disruptions. Organizations relying on WordPress for e-commerce, content management, or internal portals are particularly vulnerable. The critical nature of the vulnerability means that even organizations with strong perimeter defenses can be compromised if the plugin is installed and unpatched. The absence of user interaction or authentication requirements lowers the barrier for attackers, increasing the risk of automated mass exploitation campaigns targeting European entities.

Mitigation Recommendations

Immediate mitigation involves updating the 'User Verification by PickPlugins' plugin to a patched version once available. Until a patch is released, organizations should consider disabling the plugin entirely to eliminate the attack vector. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block requests with empty OTP parameters targeting the vulnerable function can provide temporary protection. Monitoring WordPress logs for suspicious login attempts with empty or missing OTP values is recommended to detect exploitation attempts. Additionally, enforcing multi-factor authentication (MFA) at the WordPress login level can reduce the impact of compromised credentials. Organizations should audit their WordPress installations to identify the presence of this plugin and verify that all user accounts have strong, unique passwords. Regular backups and incident response plans should be updated to prepare for potential compromise scenarios. Finally, educating administrators about the risk and signs of exploitation will enhance detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-27T21:22:35.296Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69327c01f88dbe026c7c159b

Added to database: 12/5/2025, 6:30:25 AM

Last enriched: 12/5/2025, 6:45:15 AM

Last updated: 12/5/2025, 8:41:39 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats