CVE-2026-7458 PUBLISHED

User Verification by PickPlugins <= 2.0.46 - Unauthenticated Authentication Bypass via OTP Verification REST API Endpoint

Assigner: Wordfence
Reserved: 29.04.2026 Published: 02.05.2026 Updated: 02.05.2026

The User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.46. This is due to the use of a loose PHP comparison operator to validate OTP codes in the "user_verification_form_wrap_process_otpLogin" function. This makes it possible for unauthenticated attackers to log in as any user with a verified email address, such as an administrator, by submitting a "true" OTP value.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 9.8

Product Status

Vendor pickplugins
Product User Verification by PickPlugins
Versions Default: unaffected
  • affected from 0 to 2.0.46 (incl.)

Credits

  • Supanat Konprom finder

References

Problem Types

  • CWE-288 Authentication Bypass Using an Alternate Path or Channel CWE