CVE-2025-69052

9.8 CRITICAL

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Registration & Login with Mobile Phone Number for WooCommerce WordPress plugin. It allows attackers to bypass access controls and potentially perform unauthorized actions due to incorrectly configured security levels. All WordPress sites using this plugin version 1.3.1 or earlier are affected.

💻 Affected Systems

Products:
  • Registration & Login with Mobile Phone Number for WooCommerce WordPress plugin
Versions: All versions up to and including 1.3.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with this specific plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain administrative access to WordPress sites, modify user accounts, access sensitive customer data, or install malicious plugins/themes.

🟠

Likely Case

Unauthorized access to user registration/login functions, potential privilege escalation, or manipulation of user accounts and settings.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication mechanisms, and regular security monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Missing authorization vulnerabilities typically require minimal technical skill to exploit once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.3.1

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/registration-login-with-mobile-phone-number/vulnerability/wordpress-registration-login-with-mobile-phone-number-for-woocommerce-plugin-1-2-9-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Registration & Login with Mobile Phone Number for WooCommerce'. 4. Click 'Update Now' if available, or download latest version from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched version is available

wp plugin deactivate registration-login-with-mobile-phone-number

Implement web application firewall rules

all

Block suspicious requests to plugin endpoints

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the WordPress admin interface
  • Enable detailed logging and monitoring for unauthorized access attempts to plugin endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Registration & Login with Mobile Phone Number for WooCommerce' version 1.3.1 or lower

Check Version:

wp plugin get registration-login-with-mobile-phone-number --field=version

Verify Fix Applied:

Confirm plugin version is higher than 1.3.1 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Access to plugin admin functions from unauthorized IPs
  • Failed authorization checks in plugin logs

Network Indicators:

  • HTTP requests to plugin-specific endpoints with suspicious parameters
  • Unauthorized API calls to registration/login functions

SIEM Query:

source="wordpress.log" AND (plugin="registration-login-with-mobile-phone-number" AND (action="admin_access" OR status="unauthorized"))

🔗 References

📤 Share & Export