CVE-2025-3876
📋 TL;DR
This vulnerability in the SMS Alert Order Notifications WooCommerce plugin allows authenticated attackers with Subscriber-level access or higher to impersonate any user account by supplying a username or email, then elevate their privileges to administrator level. The flaw exists in insufficient OTP validation during user creation/login. All WordPress sites using this plugin up to version 3.8.1 are affected.
💻 Affected Systems
- SMS Alert Order Notifications - WooCommerce WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full administrative control over the WordPress site, allowing them to install backdoors, steal sensitive data, deface the site, or use it as a platform for further attacks.
Likely Case
Attackers with basic authenticated access escalate to administrator privileges, compromising the site's security and potentially accessing customer data, payment information, and business operations.
If Mitigated
With proper access controls and monitoring, the attack would be detected early, limiting damage to temporary privilege escalation that can be quickly remediated.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once an attacker has basic credentials.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.8.2 or later
Vendor Advisory: https://wordpress.org/plugins/sms-alert/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'SMS Alert Order Notifications - WooCommerce'. 4. Click 'Update Now' if available, or download version 3.8.2+ from WordPress repository. 5. Activate the updated plugin.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate sms-alert
Restrict User Registration
allLimit new user registrations to prevent attackers gaining initial access
Settings → General → Membership: Uncheck 'Anyone can register'
🧯 If You Can't Patch
- Immediately disable the SMS Alert plugin and use alternative notification methods
- Implement strict user access monitoring and review all administrator accounts for unauthorized changes
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin: Plugins → Installed Plugins, look for SMS Alert plugin version 3.8.1 or earlier
Check Version:
wp plugin get sms-alert --field=version
Verify Fix Applied:
Confirm plugin version is 3.8.2 or later in WordPress admin plugins page
📡 Detection & Monitoring
Log Indicators:
- Unusual user privilege escalation events
- Multiple failed OTP validation attempts
- User accounts being created/modified by non-admin users
- Admin actions from previously non-admin accounts
Network Indicators:
- HTTP POST requests to /wp-admin/admin-ajax.php with action=handleWpLoginCreateUserAction
- Unusual authentication patterns from subscriber-level accounts
SIEM Query:
source="wordpress" (event="user_role_changed" OR event="user_created") AND user_role="subscriber" AND new_role="administrator"
🔗 References
- https://plugins.trac.wordpress.org/browser/sms-alert/tags/3.8.0/handler/forms/class-wplogin.php#L145
- https://plugins.trac.wordpress.org/browser/sms-alert/tags/3.8.0/handler/forms/class-wplogin.php#L447
- https://plugins.trac.wordpress.org/changeset/3290478/
- https://wordpress.org/plugins/sms-alert/#developers
- https://www.wordfence.com/threat-intel/vulnerabilities/id/1cf65f79-d386-4dd4-a360-b2f764dfaf19?source=cve