What this page helps you verify fast
This hub clusters every indexed record for OTP Login With Phone Number, OTP Verification so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.
Review known vulnerability records for the WordPress plugin OTP Login With Phone Number, OTP Verification (`login-with-phone-number`), including severity, CVE references, affected versions, and patch status.
Recent tracked CVEs on this page include CVE-2025-8342, CVE-2024-6482 and CVE-2024-37429, so operators can jump from disclosure to patch validation without scanning the full feed first.
Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.
Login with phone number <= 1.7.26 - Authentication Bypass due to Missing Empty Value Check
Login with phone number <= 1.7.49 - Authenticated (Subscriber+) Authorization Bypass to Privilege Escalation
Login with phone number <= 1.7.16 - Unauthorized Account Password Change to Privilege Escalation
Login with phone number <= 1.5.6 - Cross-Site Request Forgery to User Password Change
WooCommerce OTP Login With Phone Number, OTP Verification <= 1.8.47 - Authentication Bypass
Login with phone number <= 1.7.34 - Insecure Password Reset Mechanism
Login with phone number <= 1.3.6 - Unauthenticated Remote Plugin Deletion
Login with phone number <= 1.4.2 - Reflected Cross-Site Scripting
This hub clusters every indexed record for OTP Login With Phone Number, OTP Verification so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.
These recent records surface the CVE strings, patch cues, and direct report links most operators need first.
The WooCommerce OTP Login With Phone Number, OTP Verification plugin for WordPress is vulnerable to authentication bypass due to insufficient empty value checking in the lwp_ajax_register fu...
The Login with phone number plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.7.49. This is due to a lack of validation and missing capabilit...
The Login with phone number plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.7.35 due to insufficient input sanitization and output escap...
Sorted by latest disclosure date so newly published issues surface first.
The WooCommerce OTP Login With Phone Number, OTP Verification plugin for WordPress is vulnerable to authentication bypass due to insufficient empty value checking in the lwp_ajax_register function in all versions up to, and including, 1.8.47. This makes it possible for unauthenti...
The Login with phone number plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.7.49. This is due to a lack of validation and missing capability check on user-supplied data in the 'lwp_update_password_action' function. This makes it...
The Login with phone number plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.7.35 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access a...
The Login with phone number plugin for WordPress is vulnerable to unauthorized password resets in versions up to, and including 1.7.34. This is due to the plugin generating too weak a reset code, and the code used to reset the password has no attempt or time limit. This makes it...
The Login with phone number plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.7.26. This is due to the 'activation_code' default value is empty, and the not empty check is missing in the 'lwp_ajax_register' function. This makes it pos...
The Login with phone number plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the idehweb_lwp_update_billing_phones function in versions up to, and including, 1.7.18. This makes it possible for authenticated attackers, wi...
The Login with phone number plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on a function in versions up to, and including, 1.6.93. This makes it possible for unauthenticated attackers to perform an unauthorized action.
The Login with phone number plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.7.16. This is due to the plugin not properly verifying the identity of a user who is trying to reset a password. This makes it possible for authenticated...
The Login with phone number plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.93. This is due to missing or incorrect nonce validation on the lwp_forgot_password() and lwp_update_password_action() functions. This makes it possi...
The Login with phone number plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.6. This is due to missing nonce validation on the 'lwp_update_password_action' function. This makes it possible for unauthenticated attackers to chan...
The Login with phone number plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 1.4.1 via the 'ID' parameter of the 'lwp_forgot_password' AJAX action. This makes it possible for unauthenticated attackers to inject arbitrary web s...
The Login with phone number WordPress plugin through 1.3.7 do not sanitise and escape plugin settings which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.