The WPCOM Member plugin for WordPress is vulnerable to authentication bypass via brute force in all versions up to, and including, 1.7.16. This is due to weak OTP (One-Time Password) generation using only 6 numeric digits combined with a 10-minute validity window and no rate limiting on verification attempts. This makes it possible for unauthenticated attackers to brute-force the verification code and authenticate as any user, including administrators, if they know the target's phone number, and the target does not notice or ignores the SMS notification with the OTP.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 17 Dec 2025 02:15:00 +0900

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpcom
Wpcom wpcom Member
Vendors & Products Wordpress
Wordpress wordpress
Wpcom
Wpcom wpcom Member

Wed, 17 Dec 2025 00:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 16 Dec 2025 18:30:00 +0900

Type Values Removed Values Added
Description The WPCOM Member plugin for WordPress is vulnerable to authentication bypass via brute force in all versions up to, and including, 1.7.16. This is due to weak OTP (One-Time Password) generation using only 6 numeric digits combined with a 10-minute validity window and no rate limiting on verification attempts. This makes it possible for unauthenticated attackers to brute-force the verification code and authenticate as any user, including administrators, if they know the target's phone number, and the target does not notice or ignores the SMS notification with the OTP.
Title WPCOM Member <= 1.7.16 - Authentication Bypass via Weak OTP
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-12-16T14:58:11.381Z

Reserved: 2025-12-04T02:28:05.914Z

Link: CVE-2025-14002

cve-icon Vulnrichment

Updated: 2025-12-16T14:57:05.380Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-16T10:15:42.583

Modified: 2025-12-16T14:10:11.300

Link: CVE-2025-14002

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-17T02:08:37Z

Weaknesses