CVE-2026-7458

PickPlugins · User Verification

The User Verification plugin for WordPress is vulnerable to authentication bypass due to loose comparison of OTP codes, allowing unauthenticated login.

Executive summary

An authentication bypass in the User Verification by PickPlugins WordPress plugin allows unauthenticated attackers to log in as any verified user, including administrators.

Vulnerability

The vulnerability stems from the use of a loose PHP comparison operator when validating OTP codes. This allows an attacker to bypass the verification process by providing a "true" value as the OTP.

Business impact

This flaw carries a CVSS score of 9.8, indicating extreme risk. An attacker can gain administrative access to the WordPress site, resulting in complete site compromise and potential data breach.

Remediation

Immediate Action: Update the User Verification by PickPlugins plugin to the latest version immediately.

Proactive Monitoring: Monitor authentication logs for suspicious successful logins and verify that all administrative logins are coming from trusted sources.

Compensating Controls: Temporarily disable the plugin if an update is not immediately available to mitigate the risk of unauthorized access.

Exploitation status

Public Exploit Available: No

Analyst recommendation

The vulnerability is trivial to exploit and provides high-level access. Administrators must patch this plugin immediately to prevent unauthorized administrative account takeover.