Vulnerability Description
The OTP-less one tap Sign in plugin for WordPress is vulnerable to privilege escalation via account takeover in versions 2.0.14 to 2.0.59. This is due to the plugin not properly validating a user's identity prior to updating their details, like email. This makes it possible for unauthenticated attackers to change arbitrary users' email addresses, including administrators, and leverage that to reset the user's password and gain access to their account. Additionally, the plugin returns authentication cookies in the response, which can be used to access the account directly.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/otpless/tags/2.0.59./includes/class-l
- https://www.wordfence.com/threat-intel/vulnerabilities/id/63fab608-1a75-4b07-8d8
FAQ
What is CVE-2025-3746?
CVE-2025-3746 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The OTP-less one tap Sign in plugin for WordPress is vulnerable to privilege escalation via account takeover in versions 2.0.14 to 2.0.59. This is due to the plugin not properly validating a user's id...
How severe is CVE-2025-3746?
CVE-2025-3746 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-3746?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.