CVE-2025-3746: CWE-862 Missing Authorization in thedrifted OTP-less one tap Sign in
The OTP-less one tap Sign in plugin for WordPress is vulnerable to privilege escalation via account takeover in versions 2.0.14 to 2.0.59. This is due to the plugin not properly validating a user's identity prior to updating their details, like email. This makes it possible for unauthenticated attackers to change arbitrary users' email addresses, including administrators, and leverage that to reset the user's password and gain access to their account. Additionally, the plugin returns authentication cookies in the response, which can be used to access the account directly.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-3746 affects the OTP-less one tap Sign in plugin for WordPress, specifically versions 2.0.14 through 2.0.59. The core issue is a missing authorization check (CWE-862) that fails to properly validate a user's identity before allowing updates to sensitive account details such as email addresses. Because of this, unauthenticated attackers can arbitrarily modify the email addresses of any user, including administrators. Changing an administrator's email allows the attacker to initiate password reset flows, effectively taking over the account. Compounding the risk, the plugin returns authentication cookies in the response, which attackers can use to gain immediate access without further authentication. The vulnerability is remotely exploitable without any user interaction or prior privileges, making it highly dangerous. The CVSS 3.1 base score is 9.8 (critical), reflecting the ease of exploitation and the severe impact on confidentiality, integrity, and availability of affected WordPress sites. Although no active exploits have been reported yet, the vulnerability's nature makes it a prime target for attackers. The plugin is widely used in WordPress environments, increasing the potential attack surface. The vulnerability was publicly disclosed on May 2, 2025, and is tracked by Wordfence and CISA, emphasizing its significance in the security community.
Potential Impact
This vulnerability allows attackers to escalate privileges from unauthenticated status to full administrative control over WordPress sites using the affected plugin. By changing email addresses and resetting passwords, attackers can completely compromise site administrators' accounts, leading to full site takeover. This can result in data breaches, defacement, installation of backdoors, or use of the site as a launchpad for further attacks. The exposure of authentication cookies further facilitates unauthorized access without needing to complete normal login procedures. Organizations relying on this plugin face risks including loss of sensitive data, disruption of services, damage to reputation, and potential regulatory penalties. Given WordPress's widespread use globally, the impact can be extensive, affecting websites ranging from small businesses to large enterprises and government portals. The vulnerability's critical severity and ease of exploitation make it a high priority for remediation to prevent widespread compromise.
Mitigation Recommendations
Immediate mitigation involves updating the OTP-less one tap Sign in plugin to a patched version once available. Until a patch is released, organizations should consider disabling or uninstalling the plugin to eliminate the attack vector. Implementing web application firewalls (WAFs) with rules to detect and block suspicious requests targeting the plugin's endpoints can reduce risk. Monitoring logs for unusual email change requests or password resets can help detect exploitation attempts early. Restricting administrative access via IP whitelisting and enforcing multi-factor authentication (MFA) on WordPress accounts can limit the impact of compromised credentials. Additionally, reviewing and tightening user permission policies and conducting regular security audits on WordPress installations are recommended. Organizations should also keep abreast of updates from the plugin vendor and security advisories from trusted sources like CISA and Wordfence.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, South Korea, Italy, Spain
CVE-2025-3746: CWE-862 Missing Authorization in thedrifted OTP-less one tap Sign in
Description
The OTP-less one tap Sign in plugin for WordPress is vulnerable to privilege escalation via account takeover in versions 2.0.14 to 2.0.59. This is due to the plugin not properly validating a user's identity prior to updating their details, like email. This makes it possible for unauthenticated attackers to change arbitrary users' email addresses, including administrators, and leverage that to reset the user's password and gain access to their account. Additionally, the plugin returns authentication cookies in the response, which can be used to access the account directly.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-3746 affects the OTP-less one tap Sign in plugin for WordPress, specifically versions 2.0.14 through 2.0.59. The core issue is a missing authorization check (CWE-862) that fails to properly validate a user's identity before allowing updates to sensitive account details such as email addresses. Because of this, unauthenticated attackers can arbitrarily modify the email addresses of any user, including administrators. Changing an administrator's email allows the attacker to initiate password reset flows, effectively taking over the account. Compounding the risk, the plugin returns authentication cookies in the response, which attackers can use to gain immediate access without further authentication. The vulnerability is remotely exploitable without any user interaction or prior privileges, making it highly dangerous. The CVSS 3.1 base score is 9.8 (critical), reflecting the ease of exploitation and the severe impact on confidentiality, integrity, and availability of affected WordPress sites. Although no active exploits have been reported yet, the vulnerability's nature makes it a prime target for attackers. The plugin is widely used in WordPress environments, increasing the potential attack surface. The vulnerability was publicly disclosed on May 2, 2025, and is tracked by Wordfence and CISA, emphasizing its significance in the security community.
Potential Impact
This vulnerability allows attackers to escalate privileges from unauthenticated status to full administrative control over WordPress sites using the affected plugin. By changing email addresses and resetting passwords, attackers can completely compromise site administrators' accounts, leading to full site takeover. This can result in data breaches, defacement, installation of backdoors, or use of the site as a launchpad for further attacks. The exposure of authentication cookies further facilitates unauthorized access without needing to complete normal login procedures. Organizations relying on this plugin face risks including loss of sensitive data, disruption of services, damage to reputation, and potential regulatory penalties. Given WordPress's widespread use globally, the impact can be extensive, affecting websites ranging from small businesses to large enterprises and government portals. The vulnerability's critical severity and ease of exploitation make it a high priority for remediation to prevent widespread compromise.
Mitigation Recommendations
Immediate mitigation involves updating the OTP-less one tap Sign in plugin to a patched version once available. Until a patch is released, organizations should consider disabling or uninstalling the plugin to eliminate the attack vector. Implementing web application firewalls (WAFs) with rules to detect and block suspicious requests targeting the plugin's endpoints can reduce risk. Monitoring logs for unusual email change requests or password resets can help detect exploitation attempts early. Restricting administrative access via IP whitelisting and enforcing multi-factor authentication (MFA) on WordPress accounts can limit the impact of compromised credentials. Additionally, reviewing and tightening user permission policies and conducting regular security audits on WordPress installations are recommended. Organizations should also keep abreast of updates from the plugin vendor and security advisories from trusted sources like CISA and Wordfence.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-04-16T19:23:59.977Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6b8a
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 2/27/2026, 1:46:46 PM
Last updated: 3/25/2026, 7:29:09 AM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.