CVE-2025-54745

6.5 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the miniOrange Google Authenticator WordPress plugin, allowing attackers to bypass intended access controls. It affects all versions up to and including 6.1.1, potentially compromising sites using this plugin for two-factor authentication.

💻 Affected Systems

Products:
  • miniOrange Google Authenticator (WordPress plugin)
Versions: n/a through <= 6.1.1
Operating Systems: All (WordPress-based)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the plugin enabled; no specific OS dependencies.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could disable or modify 2FA settings, gain unauthorized administrative access, or compromise user accounts, leading to full site takeover or data breach.

🟠

Likely Case

Unauthorized users could disable 2FA for accounts, reducing security and enabling credential-based attacks.

🟢

If Mitigated

With proper access controls, impact is limited to authorized users only, maintaining 2FA integrity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation likely requires some level of access but is straightforward due to missing authorization checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 6.1.1

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/miniorange-2-factor-authentication/vulnerability/wordpress-miniorange-s-google-authenticator-plugin-6-1-1-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'miniOrange Google Authenticator' and update to latest version. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable Plugin Temporarily

all

Deactivate the plugin to prevent exploitation until patched, but this removes 2FA functionality.

wp plugin deactivate miniorange-2-factor-authentication

🧯 If You Can't Patch

  • Restrict access to WordPress admin interface using IP whitelisting or firewall rules.
  • Implement additional authentication layers (e.g., web application firewall) to monitor for unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins > Installed Plugins; if version is 6.1.1 or lower, it is vulnerable.

Check Version:

wp plugin get miniorange-2-factor-authentication --field=version

Verify Fix Applied:

After update, confirm version is > 6.1.1 in the plugin list and test 2FA functionality remains intact.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to plugin admin endpoints from unauthorized IPs or users
  • Failed authorization logs for 2FA settings changes

Network Indicators:

  • Suspicious traffic to /wp-admin/admin.php?page=mo_2fa_settings or similar plugin paths

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin.php" AND query="page=mo_2fa_settings") AND user NOT IN [authorized_users]

🔗 References

📤 Share & Export