Skip to main content

CVE-2025-3746: CWE-862 Missing Authorization in thedrifted OTP-less one tap Sign in

Critical
VulnerabilityCVE-2025-3746cvecve-2025-3746cwe-862
Published: Fri May 02 2025 (05/02/2025, 01:43:35 UTC)
Source: CVE
Vendor/Project: thedrifted
Product: OTP-less one tap Sign in

Description

The OTP-less one tap Sign in plugin for WordPress is vulnerable to privilege escalation via account takeover in versions 2.0.14 to 2.0.59. This is due to the plugin not properly validating a user's identity prior to updating their details, like email. This makes it possible for unauthenticated attackers to change arbitrary users' email addresses, including administrators, and leverage that to reset the user's password and gain access to their account. Additionally, the plugin returns authentication cookies in the response, which can be used to access the account directly.

AI-Powered Analysis

AILast updated: 07/12/2025, 03:47:39 UTC

Technical Analysis

CVE-2025-3746 is a critical security vulnerability affecting the 'OTP-less one tap Sign in' WordPress plugin developed by thedrifted, specifically versions 2.0.14 through 2.0.59. The vulnerability stems from improper authorization checks (CWE-862) where the plugin fails to adequately validate a user's identity before allowing updates to sensitive account details, such as email addresses. This flaw enables unauthenticated attackers to arbitrarily change the email addresses of any user account, including those with administrative privileges. By changing the email address, attackers can initiate password reset procedures to take over the targeted accounts. Compounding the risk, the plugin returns authentication cookies in the response after such changes, allowing attackers to bypass normal login flows and directly access compromised accounts. The vulnerability has been assigned a CVSS v3.1 base score of 9.8, indicating critical severity, with attack vector being network-based, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild yet, the ease of exploitation and the potential for complete account takeover make this a highly urgent threat. The vulnerability affects a widely used authentication plugin that simplifies WordPress login by removing the need for one-time passwords, which may be attractive to many site administrators seeking user convenience but inadvertently exposing themselves to this risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites that use the 'OTP-less one tap Sign in' plugin for user authentication. Successful exploitation can lead to full account takeover, including administrator accounts, allowing attackers to manipulate website content, steal sensitive data, deploy malware, or use the compromised site as a foothold for further network intrusion. This can result in data breaches violating GDPR regulations, leading to legal penalties and reputational damage. The direct issuance of authentication cookies to attackers further increases the risk by enabling immediate unauthorized access without additional authentication steps. Organizations in sectors such as e-commerce, government, healthcare, and finance, which often use WordPress for public-facing portals, are particularly vulnerable. The compromise of administrative accounts can disrupt business operations, cause service outages, and facilitate the spread of misinformation or fraudulent activities. Given the critical nature of the vulnerability and the potential for widespread exploitation, European entities must prioritize remediation to maintain compliance and protect their digital assets.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately identify and inventory all WordPress installations using the 'OTP-less one tap Sign in' plugin, focusing on versions 2.0.14 through 2.0.59. 2) Apply patches or updates as soon as the vendor releases a fixed version; if no patch is available, temporarily disable or uninstall the plugin to prevent exploitation. 3) Implement additional access controls and monitoring on WordPress administrative accounts, including enforcing multi-factor authentication (MFA) at the WordPress login level to reduce the impact of credential compromise. 4) Monitor logs for unusual account changes, especially email modifications and password reset requests, to detect potential exploitation attempts early. 5) Restrict network access to WordPress admin interfaces using IP whitelisting or VPNs where feasible. 6) Educate site administrators about the risks of using plugins that bypass standard authentication flows and encourage regular security audits of third-party components. 7) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting this vulnerability. 8) Review and harden password reset workflows to require additional verification steps beyond email confirmation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-16T19:23:59.977Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6b8a

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/12/2025, 3:47:39 AM

Last updated: 7/31/2025, 2:19:05 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats