Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-5150 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical auth bypass in 'Login with phone number' plugin (v1.7.26 & prior). <br>πŸ”₯ **Consequences**: Attackers bypass identity verification entirely.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Missing non-null check in `wp_ajax_register` function. <br>πŸ“‰ **CWE**: CWE-288 (Authentication Bypass Using an Alternate Path or Bypass). The code fails to validate input properly.

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: glboy. <br>πŸ“¦ **Product**: OTP Login With Phone Number / OTP Verification. <br>πŸ“… **Affected**: Versions **1.7.26 and earlier**. WordPress core is also mentioned but the specific flaw is in the plugin.

Q4What can hackers do? (Privileges/Data)

πŸ’» **Privileges**: Attackers gain unauthorized access. <br>πŸ”“ **Impact**: High Confidentiality, Integrity, and Availability impact. Essentially, they can log in as any user or create accounts without proper verification.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. <br>🌐 **Network**: AV:N (Network exploitable). <br>πŸ”‘ **Auth**: PR:N (No privileges required). <br>πŸ‘€ **UI**: UI:N (No user interaction needed). Easy to exploit remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ•΅οΈ **Exploit Status**: No public PoC/Exploit listed in the data (`pocs: []`).…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for installed version of 'Login with phone number'. <br>πŸ“Š **Indicator**: Check if version ≀ 1.7.26.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fix**: Yes, updated versions exist. <br>πŸ”— **Reference**: Changeset 3090754 indicates a fix was committed. <br>πŸ“₯ **Action**: Update to the latest version immediately via WordPress admin or manual download.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching is delayed, **disable the plugin** immediately. <br>πŸ”’ **Alternative**: Switch to standard email/password authentication or a different, secure phone login plugin.…

Q10Is it urgent? (Priority Suggestion)

πŸ”΄ **Priority**: **CRITICAL**. <br>πŸš€ **Urgency**: High. CVSS 3.1 vector indicates severe impact. <br>⏱️ **Action**: Patch NOW. This allows direct authentication bypass, posing an immediate threat to site security.