The Orion Login with SMS plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.5. This is due to the olws_handle_verify_phone() function not utilizing a strong enough OTP value, exposing the hash needed to generate the OTP value, and no restrictions on the number of attempts to submit the code. This makes it possible for unauthenticated attackers to log in as other users, including administrators, if they have access to their phone number.
Metrics
Affected Vendors & Products
References
History
Tue, 22 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 22 Jul 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Orion Login with SMS plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.5. This is due to the olws_handle_verify_phone() function not utilizing a strong enough OTP value, exposing the hash needed to generate the OTP value, and no restrictions on the number of attempts to submit the code. This makes it possible for unauthenticated attackers to log in as other users, including administrators, if they have access to their phone number. | |
Title | Orion Login with SMS <= 1.0.5 - Authenticated Bypass via Weak OTP | |
Weaknesses | CWE-288 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-07-22T09:22:42.768Z
Updated: 2025-07-22T13:20:49.176Z
Reserved: 2025-07-15T19:31:18.509Z
Link: CVE-2025-7692

Updated: 2025-07-22T13:20:40.984Z

Status : Awaiting Analysis
Published: 2025-07-22T10:15:26.357
Modified: 2025-07-22T13:05:40.573
Link: CVE-2025-7692

No data.