CVE-2025-3876

8.8 HIGH

📋 TL;DR

This vulnerability in the SMS Alert Order Notifications WooCommerce plugin allows authenticated attackers with Subscriber-level access or higher to impersonate any user account by supplying a username or email, then elevate their privileges to administrator level. The flaw exists in insufficient OTP validation during user creation/login. All WordPress sites using this plugin up to version 3.8.1 are affected.

💻 Affected Systems

Products:
  • SMS Alert Order Notifications - WooCommerce WordPress Plugin
Versions: All versions up to and including 3.8.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and active. Attackers need at least Subscriber-level authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over the WordPress site, allowing them to install backdoors, steal sensitive data, deface the site, or use it as a platform for further attacks.

🟠

Likely Case

Attackers with basic authenticated access escalate to administrator privileges, compromising the site's security and potentially accessing customer data, payment information, and business operations.

🟢

If Mitigated

With proper access controls and monitoring, the attack would be detected early, limiting damage to temporary privilege escalation that can be quickly remediated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has basic credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.8.2 or later

Vendor Advisory: https://wordpress.org/plugins/sms-alert/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'SMS Alert Order Notifications - WooCommerce'. 4. Click 'Update Now' if available, or download version 3.8.2+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate sms-alert

Restrict User Registration

all

Limit new user registrations to prevent attackers gaining initial access

Settings → General → Membership: Uncheck 'Anyone can register'

🧯 If You Can't Patch

  • Immediately disable the SMS Alert plugin and use alternative notification methods
  • Implement strict user access monitoring and review all administrator accounts for unauthorized changes

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin: Plugins → Installed Plugins, look for SMS Alert plugin version 3.8.1 or earlier

Check Version:

wp plugin get sms-alert --field=version

Verify Fix Applied:

Confirm plugin version is 3.8.2 or later in WordPress admin plugins page

📡 Detection & Monitoring

Log Indicators:

  • Unusual user privilege escalation events
  • Multiple failed OTP validation attempts
  • User accounts being created/modified by non-admin users
  • Admin actions from previously non-admin accounts

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action=handleWpLoginCreateUserAction
  • Unusual authentication patterns from subscriber-level accounts

SIEM Query:

source="wordpress" (event="user_role_changed" OR event="user_created") AND user_role="subscriber" AND new_role="administrator"

🔗 References

📤 Share & Export