Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7400 | The WPCOM Member plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.5. This is due to insufficient verification on the 'user_phone' parameter when logging in. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if SMS login is enabled. |
Fri, 07 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 07 Mar 2025 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WPCOM Member plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.5. This is due to insufficient verification on the 'user_phone' parameter when logging in. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if SMS login is enabled. | |
| Title | WPCOM Member <= 1.7.5 - Authentication Bypass via 'user_phone' | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:33:18.719Z
Reserved: 2025-02-19T16:29:36.050Z
Link: CVE-2025-1475
Updated: 2025-03-07T16:21:39.344Z
Status : Deferred
Published: 2025-03-07T07:15:23.343
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-1475
No data.
OpenCVE Enrichment
Updated: 2026-04-28T03:45:20Z
EUVD