CVE-2025-9967

The · The Orion SMS OTP Verification plugin for WordPress

A critical vulnerability exists in the Orion SMS OTP Verification plugin for WordPress, identified as CVE-2025-9967.

Executive summary

A critical vulnerability exists in the Orion SMS OTP Verification plugin for WordPress, identified as CVE-2025-9967. This flaw allows an unauthenticated attacker to bypass security checks and take over any user account, including administrative accounts. Successful exploitation could lead to a complete compromise of the affected WordPress site, resulting in data theft, website defacement, or malware distribution.

Vulnerability

The vulnerability allows for privilege escalation via account takeover due to improper validation of the One-Time Password (OTP) provided by the user during login or password reset processes. An attacker can likely bypass the SMS verification step by submitting a specially crafted request or exploiting a logic flaw in the validation code. This would grant them access to the targeted account without needing the legitimate OTP, effectively allowing them to seize control of any user's account, including those with administrative privileges.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8, reflecting the high potential for significant damage. An attacker gaining administrative access to a WordPress site can steal sensitive user data, intellectual property, or customer payment information. Further risks include severe reputational damage from website defacement, loss of customer trust, and the potential for the compromised site to be used for hosting malware or launching further attacks against visitors.

Remediation

Immediate Action: Immediately update the Orion SMS OTP Verification plugin for WordPress to the latest patched version (1.1.8 or newer). After patching, it is crucial to monitor for any signs of exploitation that may have occurred prior to the update and review all administrative access logs for suspicious activity.

Proactive Monitoring: Security teams should actively monitor for unusual login or password reset attempts, especially from unfamiliar IP addresses or geographical locations. Review web server and application logs for anomalous patterns in requests to the OTP verification endpoint. Implement alerts for the creation of new administrative accounts or unexpected changes to existing high-privilege accounts.

Compensating Controls: If immediate patching is not feasible, consider disabling the Orion SMS OTP Verification plugin until it can be updated. Alternatively, implement a Web Application Firewall (WAF) with custom rules to block suspicious OTP validation attempts. Restricting access to the WordPress administrative dashboard (/wp-admin) to trusted IP addresses can also serve as a temporary mitigating control.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical severity of this vulnerability, immediate remediation is strongly recommended. The potential for a complete site compromise presents an unacceptable risk to the organization. All instances of the Orion SMS OTP Verification plugin must be updated to the latest version without delay. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high CVSS score warrants treating it with the highest priority for patching.