CVE-2026-7458
PickPlugins · User Verification
The User Verification plugin for WordPress is vulnerable to authentication bypass due to loose comparison of OTP codes, allowing unauthenticated login.
Executive summary
An authentication bypass in the User Verification by PickPlugins WordPress plugin allows unauthenticated attackers to log in as any verified user, including administrators.
Vulnerability
The vulnerability stems from the use of a loose PHP comparison operator when validating OTP codes. This allows an attacker to bypass the verification process by providing a "true" value as the OTP.
Business impact
This flaw carries a CVSS score of 9.8, indicating extreme risk. An attacker can gain administrative access to the WordPress site, resulting in complete site compromise and potential data breach.
Remediation
Immediate Action: Update the User Verification by PickPlugins plugin to the latest version immediately.
Proactive Monitoring: Monitor authentication logs for suspicious successful logins and verify that all administrative logins are coming from trusted sources.
Compensating Controls: Temporarily disable the plugin if an update is not immediately available to mitigate the risk of unauthorized access.
Exploitation status
Public Exploit Available: No
Analyst recommendation
The vulnerability is trivial to exploit and provides high-level access. Administrators must patch this plugin immediately to prevent unauthorized administrative account takeover.