Vulnerability Description
The Orion Login with SMS plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.5. This is due to the olws_handle_verify_phone() function not utilizing a strong enough OTP value, exposing the hash needed to generate the OTP value, and no restrictions on the number of attempts to submit the code. This makes it possible for unauthenticated attackers to log in as other users, including administrators, if they have access to their phone number.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://wordpress.org/plugins/orion-login-with-sms/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/31a47cbd-c19b-4ac3-87e
FAQ
What is CVE-2025-7692?
CVE-2025-7692 is a vulnerability with a CVSS score of 8.1 (HIGH). The Orion Login with SMS plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.5. This is due to the olws_handle_verify_phone() function not utilizing a...
How severe is CVE-2025-7692?
CVE-2025-7692 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-7692?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.