Skip to main content

CVE-2025-4094: CWE-287 Improper Authentication in DIGITS: WordPress Mobile Number Signup and Login

Low
VulnerabilityCVE-2025-4094cvecve-2025-4094cwe-287
Published: Wed May 21 2025 (05/21/2025, 06:00:09 UTC)
Source: CVE
Vendor/Project: Unknown
Product: DIGITS: WordPress Mobile Number Signup and Login

Description

The DIGITS: WordPress Mobile Number Signup and Login WordPress plugin before 8.4.6.1 does not rate limit OTP validation attempts, making it straightforward for attackers to bruteforce them.

AI-Powered Analysis

AILast updated: 07/06/2025, 04:54:32 UTC

Technical Analysis

CVE-2025-4094 is a critical vulnerability identified in the DIGITS: WordPress Mobile Number Signup and Login plugin, affecting versions prior to 8.4.6.1. This plugin facilitates user authentication on WordPress sites via mobile number and OTP (One-Time Password) validation. The core issue is the absence of rate limiting on OTP validation attempts, which allows an attacker to perform brute-force attacks against the OTP verification mechanism. Without any throttling or lockout mechanisms, an attacker can systematically try numerous OTP codes to gain unauthorized access to user accounts. This vulnerability falls under CWE-287 (Improper Authentication), indicating a failure to properly verify user identity before granting access. The CVSS v3.1 score is 9.8, reflecting a critical severity due to the vulnerability's network exploitable nature (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and its impact on confidentiality, integrity, and availability (all high). Exploitation could lead to full account takeover, data theft, unauthorized actions on behalf of users, and potential site compromise. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a high-risk target for attackers seeking to compromise WordPress sites using this plugin.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on the DIGITS plugin for user authentication. Successful exploitation can lead to unauthorized access to sensitive user data, including personal information and potentially payment or transactional data if integrated with e-commerce functionalities. This can result in data breaches, reputational damage, regulatory penalties under GDPR, and operational disruptions. Since WordPress powers a substantial portion of websites in Europe, including many SMEs and enterprises, the widespread use of this plugin could expose a large attack surface. Attackers could leverage compromised accounts to escalate privileges, inject malicious content, or pivot to internal networks. The lack of rate limiting makes automated attacks feasible at scale, increasing the likelihood of mass account compromises. Additionally, organizations in regulated sectors such as finance, healthcare, and public services may face heightened scrutiny and compliance challenges following exploitation.

Mitigation Recommendations

Organizations should immediately update the DIGITS plugin to version 8.4.6.1 or later where the vulnerability is patched. If an update is not immediately possible, implement compensating controls such as deploying web application firewalls (WAFs) with rules to detect and block rapid OTP validation attempts from the same IP or user agent. Enforce multi-factor authentication (MFA) beyond OTP where feasible to add an additional security layer. Monitor authentication logs for unusual patterns indicative of brute-force attempts. Limit the number of OTP attempts per user or IP address at the application or network level. Educate users about suspicious login activities and encourage strong account recovery procedures. Regularly audit and review plugin usage and permissions to minimize exposure. Finally, consider alternative authentication plugins with robust security features if the DIGITS plugin cannot be updated promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-04-29T13:42:37.259Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d700cd4f2164cc9243b17

Added to database: 5/21/2025, 6:17:48 AM

Last enriched: 7/6/2025, 4:54:32 AM

Last updated: 8/14/2025, 8:00:33 PM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats