Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14002: CWE-287 Improper Authentication in whyun WPCOM Member

0
High
VulnerabilityCVE-2025-14002cvecve-2025-14002cwe-287
Published: Tue Dec 16 2025 (12/16/2025, 09:20:09 UTC)
Source: CVE Database V5
Vendor/Project: whyun
Product: WPCOM Member

Description

The WPCOM Member plugin for WordPress is vulnerable to authentication bypass via brute force in all versions up to, and including, 1.7.16. This is due to weak OTP (One-Time Password) generation using only 6 numeric digits combined with a 10-minute validity window and no rate limiting on verification attempts. This makes it possible for unauthenticated attackers to brute-force the verification code and authenticate as any user, including administrators, if they know the target's phone number, and the target does not notice or ignores the SMS notification with the OTP.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 10:40:34 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14002 affects the WPCOM Member plugin for WordPress, specifically versions up to and including 1.7.16. The root cause is an improper authentication mechanism (CWE-287) related to the One-Time Password (OTP) verification process. The plugin generates OTPs consisting of only 6 numeric digits, which inherently limits the keyspace to 1 million possibilities. These OTPs remain valid for 10 minutes, and critically, the plugin does not implement any rate limiting on OTP verification attempts. This combination enables an attacker to perform a brute-force attack against the OTP verification endpoint without requiring prior authentication or user interaction. If the attacker knows the victim's phone number, they can systematically guess OTP codes until successful authentication is achieved. This flaw allows the attacker to bypass authentication controls and log in as any user, including those with administrative privileges, thereby compromising the confidentiality, integrity, and availability of the affected WordPress site. The vulnerability has a CVSS 3.1 base score of 8.1, reflecting its high severity due to network attack vector, no privileges required, no user interaction, and high impact on all security properties. Although no exploits have been observed in the wild yet, the vulnerability is publicly disclosed and should be considered a critical risk for sites using the affected plugin. No official patches or mitigations have been linked yet, emphasizing the need for immediate defensive measures.

Potential Impact

The impact of CVE-2025-14002 is significant for organizations using the WPCOM Member plugin on WordPress sites. Successful exploitation allows attackers to bypass authentication entirely, gaining unauthorized access to user accounts, including administrators. This can lead to full site compromise, data theft, defacement, installation of backdoors, or pivoting to other internal systems. The confidentiality of sensitive user data and organizational information is at risk, as is the integrity of website content and configurations. Availability may also be affected if attackers disrupt services or deploy ransomware. Since WordPress powers a large portion of the web, and the plugin is used globally, the potential attack surface is broad. Organizations relying on this plugin for membership management or user authentication face elevated risks of account takeover and subsequent malicious activities. The lack of rate limiting and weak OTP design make automated attacks feasible, increasing the likelihood of exploitation once the vulnerability is widely known.

Mitigation Recommendations

To mitigate CVE-2025-14002, organizations should immediately implement the following measures: 1) Disable or uninstall the WPCOM Member plugin until a secure patched version is released. 2) If disabling is not feasible, restrict access to the OTP verification endpoint via web application firewall (WAF) rules or IP whitelisting to limit brute-force attempts. 3) Implement custom rate limiting on OTP verification requests to prevent rapid automated guessing. 4) Enhance OTP complexity by increasing length and including alphanumeric characters if plugin customization is possible. 5) Shorten OTP validity periods to reduce the attack window. 6) Monitor authentication logs for repeated failed OTP attempts and unusual login activity, especially for administrator accounts. 7) Educate users to promptly report unexpected OTP SMS messages to detect potential targeted attacks. 8) Consider deploying multi-factor authentication solutions independent of the vulnerable plugin. 9) Stay alert for official patches or updates from the vendor and apply them immediately upon release. 10) Conduct a thorough security audit of WordPress installations to identify and remediate any unauthorized access resulting from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-04T02:28:05.914Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69412552594e45819d817425

Added to database: 12/16/2025, 9:24:34 AM

Last enriched: 2/27/2026, 10:40:34 AM

Last updated: 3/25/2026, 5:42:17 PM

Views: 158

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses