Authentication Bypass Vulnerability in WPCOM Member Plugin for WordPress
CVE-2025-14002

8.1HIGH

Key Information:

Vendor

WordPress

Vendor
CVE Published:
16 December 2025

What is CVE-2025-14002?

The WPCOM Member plugin for WordPress is susceptible to an authentication bypass due to a weakness in its one-time password (OTP) generation mechanism. The plugin uses a six-digit numeric OTP, which combined with a limited validity period of only 10 minutes and the absence of rate limiting on verification attempts, creates a significant security risk. Attackers can exploit this flaw by brute-forcing the OTP if they have access to the user's phone number. If the target does not notice or ignore the SMS alert containing the OTP, unauthorized users could potentially gain access to the account, including administrator privileges.

Affected Version(s)

WPCOM Member * <= 1.7.16

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

wesley
.
CVE-2025-14002 : Authentication Bypass Vulnerability in WPCOM Member Plugin for WordPress