<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>User Verification by PickPlugins Plugin for WordPress &lt;= 2.0.46 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/user-verification-by-pickplugins-plugin-for-wordpress--2.0.46/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 05:16:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/user-verification-by-pickplugins-plugin-for-wordpress--2.0.46/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress User Verification Plugin Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-auth-bypass/</link><pubDate>Sat, 02 May 2026 05:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-auth-bypass/</guid><description>The User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in versions up to 2.0.46 due to a loose PHP comparison, allowing unauthenticated attackers to log in as any verified user by submitting a 'true' OTP value.</description><content:encoded><![CDATA[<p>The User Verification by PickPlugins plugin, a popular WordPress plugin, contains a critical authentication bypass vulnerability (CVE-2026-7458) affecting all versions up to and including 2.0.46. The flaw resides within the <code>user_verification_form_wrap_process_otpLogin</code> function, where a loose PHP comparison operator is used to validate OTP codes. This weakness allows unauthenticated attackers to bypass the OTP verification process and log in as any user with a verified email address, potentially gaining administrative access. Successful exploitation requires the attacker to submit the string &ldquo;true&rdquo; as the OTP value. This vulnerability poses a significant risk to WordPress sites using the affected plugin, potentially leading to complete site compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using a vulnerable version of the User Verification by PickPlugins plugin (&lt;= 2.0.46).</li>
<li>The attacker navigates to the OTP login form provided by the plugin.</li>
<li>The attacker enters the email address of a target user, such as an administrator.</li>
<li>The attacker intercepts the OTP request and instead of a numerical code, submits the string &ldquo;true&rdquo; as the OTP value.</li>
<li>The vulnerable <code>user_verification_form_wrap_process_otpLogin</code> function processes the submitted OTP. Due to the loose PHP comparison (e.g., <code>==</code> instead of <code>===</code>), the string &ldquo;true&rdquo; evaluates to <code>true</code>, bypassing the intended OTP validation.</li>
<li>The plugin incorrectly authenticates the attacker as the targeted user.</li>
<li>The attacker gains unauthorized access to the targeted user&rsquo;s account, potentially gaining administrative privileges.</li>
<li>The attacker can now perform actions such as modifying website content, installing malicious plugins, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7458 allows unauthenticated attackers to bypass the OTP verification mechanism and gain unauthorized access to any user account with a verified email address on a vulnerable WordPress site. This can lead to complete compromise of the affected WordPress site, enabling attackers to modify content, inject malicious code, steal sensitive data, or use the site for malicious purposes. Given the plugin&rsquo;s popularity, this vulnerability could impact a large number of WordPress websites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the User Verification by PickPlugins plugin to the latest version (greater than 2.0.46) to patch CVE-2026-7458.</li>
<li>Monitor WordPress access logs for unusual login attempts or the presence of &ldquo;true&rdquo; as OTP values to identify potential exploitation attempts. Deploy the <code>Detect Successful Authentication Bypass via True OTP</code> Sigma rule.</li>
<li>Implement stricter input validation and sanitization for OTP codes to prevent similar bypass vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>wordpress</category><category>authentication bypass</category><category>cve-2026-7458</category></item></channel></rss>