CVE-2025-8342: CWE-862 Missing Authorization in glboy WooCommerce OTP Login With Phone Number, OTP Verification
The WooCommerce OTP Login With Phone Number, OTP Verification plugin for WordPress is vulnerable to authentication bypass due to insufficient empty value checking in the lwp_ajax_register function in all versions up to, and including, 1.8.47. This makes it possible for unauthenticated attackers to bypass OTP verification and gain administrative access to any user account with a configured phone number by exploiting improper Firebase API error handling when the Firebase API key is not configured.
AI Analysis
Technical Summary
CVE-2025-8342 is an authentication bypass vulnerability classified under CWE-862 (Missing Authorization) found in the WooCommerce OTP Login With Phone Number, OTP Verification plugin for WordPress, developed by glboy. The vulnerability exists in all versions up to and including 1.8.47. Specifically, the issue arises from insufficient validation of empty values in the lwp_ajax_register function, which handles AJAX registration requests. When the Firebase API key is not configured, the plugin improperly handles Firebase API errors, allowing unauthenticated attackers to bypass the OTP verification mechanism. This bypass enables attackers to gain administrative access to any user account that has a phone number configured for OTP login. The vulnerability is remotely exploitable without any authentication or user interaction, making it highly dangerous. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability, with network attack vector and high attack complexity. Although no public exploits are known yet, the flaw’s nature and ease of exploitation pose a significant risk to WordPress sites using this plugin. The vulnerability compromises the core authentication process, potentially allowing full administrative control over affected WordPress installations.
Potential Impact
The impact of CVE-2025-8342 is severe for organizations using the affected WooCommerce OTP Login plugin. Successful exploitation grants attackers administrative access to WordPress sites, enabling them to modify content, steal sensitive data, install malware, or disrupt services. This can lead to data breaches, loss of customer trust, financial losses, and damage to brand reputation. E-commerce sites using WooCommerce are particularly at risk, as attackers could manipulate orders, access payment information, or compromise customer accounts. The vulnerability affects confidentiality by exposing user data, integrity by allowing unauthorized changes, and availability by potentially enabling denial-of-service or site defacement attacks. Given the plugin’s popularity in WordPress ecosystems worldwide, the scope of affected systems is broad. The lack of authentication or user interaction required for exploitation increases the likelihood of attacks, especially in environments where the Firebase API key is misconfigured or missing.
Mitigation Recommendations
To mitigate CVE-2025-8342, organizations should immediately verify and update the WooCommerce OTP Login With Phone Number, OTP Verification plugin to a patched version once available from the vendor. Until a patch is released, administrators should ensure the Firebase API key is properly configured to prevent the error handling flaw from being exploited. Restrict access to the AJAX registration endpoint (lwp_ajax_register) via web application firewalls or server-level access controls to limit exposure. Implement additional monitoring and alerting for suspicious administrative login attempts or unusual activity related to OTP verification. Consider temporarily disabling the OTP login feature if it cannot be securely configured. Regularly audit user accounts for unauthorized administrative privileges and enforce strong authentication policies. Engage in proactive vulnerability scanning and penetration testing focused on authentication mechanisms to detect similar issues early.
Affected Countries
United States, Germany, United Kingdom, India, Canada, Australia, France, Brazil, Japan, Netherlands, Italy, Spain
CVE-2025-8342: CWE-862 Missing Authorization in glboy WooCommerce OTP Login With Phone Number, OTP Verification
Description
The WooCommerce OTP Login With Phone Number, OTP Verification plugin for WordPress is vulnerable to authentication bypass due to insufficient empty value checking in the lwp_ajax_register function in all versions up to, and including, 1.8.47. This makes it possible for unauthenticated attackers to bypass OTP verification and gain administrative access to any user account with a configured phone number by exploiting improper Firebase API error handling when the Firebase API key is not configured.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-8342 is an authentication bypass vulnerability classified under CWE-862 (Missing Authorization) found in the WooCommerce OTP Login With Phone Number, OTP Verification plugin for WordPress, developed by glboy. The vulnerability exists in all versions up to and including 1.8.47. Specifically, the issue arises from insufficient validation of empty values in the lwp_ajax_register function, which handles AJAX registration requests. When the Firebase API key is not configured, the plugin improperly handles Firebase API errors, allowing unauthenticated attackers to bypass the OTP verification mechanism. This bypass enables attackers to gain administrative access to any user account that has a phone number configured for OTP login. The vulnerability is remotely exploitable without any authentication or user interaction, making it highly dangerous. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability, with network attack vector and high attack complexity. Although no public exploits are known yet, the flaw’s nature and ease of exploitation pose a significant risk to WordPress sites using this plugin. The vulnerability compromises the core authentication process, potentially allowing full administrative control over affected WordPress installations.
Potential Impact
The impact of CVE-2025-8342 is severe for organizations using the affected WooCommerce OTP Login plugin. Successful exploitation grants attackers administrative access to WordPress sites, enabling them to modify content, steal sensitive data, install malware, or disrupt services. This can lead to data breaches, loss of customer trust, financial losses, and damage to brand reputation. E-commerce sites using WooCommerce are particularly at risk, as attackers could manipulate orders, access payment information, or compromise customer accounts. The vulnerability affects confidentiality by exposing user data, integrity by allowing unauthorized changes, and availability by potentially enabling denial-of-service or site defacement attacks. Given the plugin’s popularity in WordPress ecosystems worldwide, the scope of affected systems is broad. The lack of authentication or user interaction required for exploitation increases the likelihood of attacks, especially in environments where the Firebase API key is misconfigured or missing.
Mitigation Recommendations
To mitigate CVE-2025-8342, organizations should immediately verify and update the WooCommerce OTP Login With Phone Number, OTP Verification plugin to a patched version once available from the vendor. Until a patch is released, administrators should ensure the Firebase API key is properly configured to prevent the error handling flaw from being exploited. Restrict access to the AJAX registration endpoint (lwp_ajax_register) via web application firewalls or server-level access controls to limit exposure. Implement additional monitoring and alerting for suspicious administrative login attempts or unusual activity related to OTP verification. Consider temporarily disabling the OTP login feature if it cannot be securely configured. Regularly audit user accounts for unauthorized administrative privileges and enforce strong authentication policies. Engage in proactive vulnerability scanning and penetration testing focused on authentication mechanisms to detect similar issues early.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-30T08:58:29.280Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689e9c51ad5a09ad00615fab
Added to database: 8/15/2025, 2:32:49 AM
Last enriched: 2/26/2026, 5:01:49 PM
Last updated: 3/24/2026, 8:36:42 AM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.