This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: A critical auth bypass in 'Login with phone number' plugin (v1.7.26 & prior). <br>π₯ **Consequences**: Attackers bypass identity verification entirely.β¦
π‘οΈ **Root Cause**: Missing non-null check in `wp_ajax_register` function. <br>π **CWE**: CWE-288 (Authentication Bypass Using an Alternate Path or Bypass). The code fails to validate input properly.
Q3Who is affected? (Versions/Components)
π’ **Vendor**: glboy. <br>π¦ **Product**: OTP Login With Phone Number / OTP Verification. <br>π **Affected**: Versions **1.7.26 and earlier**. WordPress core is also mentioned but the specific flaw is in the plugin.
Q4What can hackers do? (Privileges/Data)
π» **Privileges**: Attackers gain unauthorized access. <br>π **Impact**: High Confidentiality, Integrity, and Availability impact. Essentially, they can log in as any user or create accounts without proper verification.
Q5Is exploitation threshold high? (Auth/Config)
β‘ **Threshold**: **LOW**. <br>π **Network**: AV:N (Network exploitable). <br>π **Auth**: PR:N (No privileges required). <br>π **UI**: UI:N (No user interaction needed). Easy to exploit remotely.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π΅οΈ **Exploit Status**: No public PoC/Exploit listed in the data (`pocs: []`).β¦
β **Fix**: Yes, updated versions exist. <br>π **Reference**: Changeset 3090754 indicates a fix was committed. <br>π₯ **Action**: Update to the latest version immediately via WordPress admin or manual download.
Q9What if no patch? (Workaround)
π§ **Workaround**: If patching is delayed, **disable the plugin** immediately. <br>π **Alternative**: Switch to standard email/password authentication or a different, secure phone login plugin.β¦
π΄ **Priority**: **CRITICAL**. <br>π **Urgency**: High. CVSS 3.1 vector indicates severe impact. <br>β±οΈ **Action**: Patch NOW. This allows direct authentication bypass, posing an immediate threat to site security.