Orion SMS OTP Verification CVE-2025-9967: Privilege Escalation via Account Takeover – Brief Summary

Brief summary of CVE-2025-9967 affecting all versions up to 1.1.7 of the Orion SMS OTP Verification plugin for WordPress. This post covers technical details of the authentication bypass and privilege escalation flaw, affected versions, and vendor security history.
CVE Analysis

7 min read

ZeroPath CVE Analysis

ZeroPath CVE Analysis

2025-10-15

Orion SMS OTP Verification CVE-2025-9967: Privilege Escalation via Account Takeover – Brief Summary
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

Attackers can seize control of any WordPress user account protected by the Orion SMS OTP Verification plugin if they know the associated phone number. This critical issue exposes administrative and privileged accounts to takeover, potentially resulting in full site compromise for any WordPress installation using affected plugin versions.

The Orion SMS OTP Verification plugin is a third-party WordPress extension developed by Orion Hive. It provides SMS-based one-time password (OTP) authentication and integrates with popular plugins such as Contact Form 7 and WooCommerce. While not as widely deployed as core WordPress components, it is used by organizations seeking to add SMS-based two-factor authentication to their sites. Orion Hive has released other authentication plugins, some of which have also experienced privilege escalation vulnerabilities.

Technical Information

CVE-2025-9967 is a privilege escalation and authentication bypass vulnerability in the Orion SMS OTP Verification plugin for WordPress. All versions up to and including 1.1.7 are affected. The core issue is that the plugin’s password reset mechanism does not properly validate the identity of the requester before allowing a password change.

The attack requires only knowledge of the target user’s phone number. An unauthenticated attacker can initiate a password reset for any account, and the plugin will allow the password to be set to a one-time password (OTP) without verifying that the requester is the legitimate account owner. This flaw is referenced in the plugin’s reset-password.js file, which is involved in the password reset workflow. The vulnerability is classified as CWE-288 (Authentication Bypass Using an Alternate Path or Channel).

No public code snippets are available for this vulnerability. The exploit does not require authentication or user interaction, and can be performed remotely.

Affected Systems and Versions

  • Orion SMS OTP Verification plugin for WordPress
  • All versions up to and including 1.1.7
  • Any WordPress configuration using this plugin is vulnerable if password reset via phone number is enabled

Vendor Security History

Orion Hive, the developer of this plugin, has a history of authentication-related vulnerabilities. Notably, the Orion Login with SMS plugin (a separate product) was affected by CVE-2025-7692, which also allowed authentication bypass. The recurrence of such issues suggests systemic weaknesses in the vendor’s secure development lifecycle and authentication design.

References

Detect & fix
what others miss