Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14002: CWE-287 Improper Authentication in whyun WPCOM Member

0
High
VulnerabilityCVE-2025-14002cvecve-2025-14002cwe-287
Published: Tue Dec 16 2025 (12/16/2025, 09:20:09 UTC)
Source: CVE Database V5
Vendor/Project: whyun
Product: WPCOM Member

Description

The WPCOM Member plugin for WordPress is vulnerable to authentication bypass via brute force in all versions up to, and including, 1.7.16. This is due to weak OTP (One-Time Password) generation using only 6 numeric digits combined with a 10-minute validity window and no rate limiting on verification attempts. This makes it possible for unauthenticated attackers to brute-force the verification code and authenticate as any user, including administrators, if they know the target's phone number, and the target does not notice or ignores the SMS notification with the OTP.

AI-Powered Analysis

AILast updated: 12/16/2025, 09:32:24 UTC

Technical Analysis

The vulnerability CVE-2025-14002 affects the whyun WPCOM Member plugin for WordPress, versions up to and including 1.7.16. It is classified under CWE-287 (Improper Authentication) and stems from a weak OTP (One-Time Password) mechanism. The OTP is generated as a 6-digit numeric code, which is valid for 10 minutes, and critically, the plugin does not implement rate limiting on OTP verification attempts. This combination allows an attacker to perform brute-force attacks against the OTP verification endpoint. If the attacker knows the target user's phone number, they can repeatedly attempt OTP guesses until successful authentication is achieved. This bypasses the intended two-factor authentication protection, granting unauthorized access to user accounts, including those with administrative privileges. The attack requires no prior authentication or user interaction, making it remotely exploitable over the network. The vulnerability compromises confidentiality by exposing user accounts, integrity by allowing unauthorized actions, and availability by potentially enabling account takeover and subsequent disruption. Although no public exploits are currently known, the vulnerability's characteristics make it a significant risk. The CVSS v3.1 score of 8.1 reflects the network attack vector, high impact on confidentiality, integrity, and availability, and the lack of required privileges or user interaction. The absence of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a serious threat to WordPress-based websites using the WPCOM Member plugin. Successful exploitation can lead to unauthorized access to sensitive user accounts, including administrators, enabling attackers to manipulate website content, steal data, or deploy further malware. This can result in data breaches, reputational damage, regulatory non-compliance (e.g., GDPR violations), and operational disruptions. Given the widespread use of WordPress across Europe, especially among SMEs and public sector entities, the risk is substantial. Attackers could leverage this vulnerability to target high-profile organizations, political entities, or businesses with critical online services. The lack of rate limiting and weak OTP design increases the likelihood of brute-force attacks succeeding, especially if attackers have access to phone numbers through social engineering or data leaks. The impact extends beyond individual sites, as compromised administrator accounts can be used to pivot attacks within networks or launch supply chain attacks via compromised plugins or themes.

Mitigation Recommendations

European organizations should immediately assess their use of the WPCOM Member plugin and upgrade to a patched version once available. In the absence of an official patch, organizations should disable the plugin or its OTP feature to prevent exploitation. Implementing additional rate limiting on OTP verification endpoints can significantly reduce brute-force risks. Organizations should also consider replacing the weak 6-digit numeric OTP with more robust multi-factor authentication methods, such as time-based one-time passwords (TOTP) with longer codes or hardware tokens. Monitoring authentication logs for repeated failed OTP attempts and unusual login patterns can help detect ongoing attacks. Additionally, organizations should educate users to promptly report unexpected OTP messages and verify phone number associations. Network-level protections, such as web application firewalls (WAFs), can be configured to block excessive OTP verification attempts from single IP addresses. Finally, organizations should review and tighten access controls and conduct regular security audits of WordPress plugins and configurations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-04T02:28:05.914Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69412552594e45819d817425

Added to database: 12/16/2025, 9:24:34 AM

Last enriched: 12/16/2025, 9:32:24 AM

Last updated: 12/16/2025, 1:17:13 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats