Authentication Bypass in Orion Login with SMS Plugin for WordPress
CVE-2025-7692

8.1HIGH

Key Information:

Vendor

WordPress

Vendor
CVE Published:
22 July 2025

What is CVE-2025-7692?

The Orion Login with SMS plugin for WordPress is prone to an authentication bypass vulnerability. All versions up to 1.0.5 are affected, as the olws_handle_verify_phone() function fails to implement a robust OTP validation mechanism. Attackers can exploit this weakness by accessing the exposed hash necessary for generating OTPs, allowing them to bypass authentication. Additionally, the absence of restrictions on the number of code submission attempts permits unauthorized users to gain access to other accounts, including those of administrators, by simply knowing their phone numbers.

Affected Version(s)

Orion Login with SMS * <= 1.0.5

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Kenneth Dunn
.
CVE-2025-7692 : Authentication Bypass in Orion Login with SMS Plugin for WordPress