CVE-2026-7458 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: May 2, 2026
PickPlugins User Verification - Authentication Bypass
Published: May 2, 2026Updated: May 2, 2026Remote Exploitable
Overview
PickPlugins User Verification for WordPress <= 2.0.46 contains an authentication bypass caused by loose PHP comparison in OTP validation in user_verification_form_wrap_process_otpLogin, letting unauthenticated attackers log in as any verified user.
Severity & Score
Severity: Critical
CVSS Score: 9.8
Impact
Unauthenticated attackers can log in as any user, including administrators, leading to full account takeover.
Mitigation
Update to the latest version beyond 2.0.46.
References
- https://plugins.trac.wordpress.org/browser/user-verification/trunk/includes/functions-rest.php%23L234?rev=3461175
- https://plugins.trac.wordpress.org/browser/user-verification/trunk/templates/email-otp-login-form/hook.php%23L164?rev=3461175
- https://plugins.trac.wordpress.org/browser/user-verification/trunk/templates/email-otp-login-form/index.php%23L71?rev=3461175
- https://plugins.trac.wordpress.org/changeset/3519113/user-verification
- https://www.wordfence.com/threat-intel/vulnerabilities/id/35b86488-8f68-4738-a9a8-76d0b7976165?source=cve
Related Resources
Details
- CVE ID
- CVE-2026-7458
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- broken_authentication
- Status
- new
CWE
- CWE-288
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H