CVE-2026-7458
Authentication Bypass in User Verification WordPress Plugin
Publication date: 2026-05-02
Last updated on: 2026-05-05
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pickplugins | user_verification | to 2.0.46 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-288 | The product requires authentication, but the product has an alternate path or channel that does not require authentication. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The User Verification by PickPlugins plugin for WordPress has a vulnerability in all versions up to and including 2.0.46. This vulnerability is an authentication bypass caused by the use of a loose PHP comparison operator when validating OTP (One-Time Password) codes in the function "user_verification_form_wrap_process_otpLogin."
Because of this loose comparison, an unauthenticated attacker can bypass normal login procedures and log in as any user who has a verified email address, including administrators, by submitting a "true" OTP value.
How can this vulnerability impact me? :
This vulnerability can have severe impacts because it allows attackers to bypass authentication without valid credentials.
- Attackers can gain unauthorized access to user accounts, including those with administrative privileges.
- Once logged in as an administrator, attackers can control the WordPress site, modify content, steal data, or install malicious code.
- The vulnerability has a high severity score (CVSS 9.8), indicating critical impact on confidentiality, integrity, and availability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthenticated attackers to bypass authentication and log in as any user with a verified email address, including administrators. Such unauthorized access can lead to exposure, modification, or deletion of sensitive data.
Consequently, this poses significant risks to compliance with common standards and regulations such as GDPR and HIPAA, which require strict access controls and protection of personal and sensitive information.
Failure to prevent unauthorized access due to this vulnerability could result in violations of these regulations, potentially leading to legal penalties, data breaches, and loss of trust.