Authentication Bypass in Email Verification Plugin for WordPress
CVE-2025-12374

9.8CRITICAL

Key Information:

Vendor

WordPress

Vendor
CVE Published:
5 December 2025

What is CVE-2025-12374?

The Email Verification plugin for WordPress is susceptible to an authentication bypass vulnerability present in all versions up to and including 2.0.39. This issue arises from inadequate validation of the One-Time Password (OTP) generated by the system. Specifically, in the 'user_verification_form_wrap_process_otpLogin' function, the plugin fails to verify that an OTP was indeed generated before it is compared to user input. This oversight may allow unauthenticated attackers to gain unauthorized access by submitting a blank OTP field, enabling them to log in as any user with a verified email address, including administrators.

Affected Version(s)

User Verification by PickPlugins * <= 2.0.39

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

lucky_buddy
.
CVE-2025-12374 : Authentication Bypass in Email Verification Plugin for WordPress