{"uuid": "ec4fb58f-1dba-4e72-9641-1e3662a8a76a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1475", "type": "seen", "source": "https://t.me/cvedetector/19797", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1475 - WordPress WPCOM Member Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1475 \nPublished : March 7, 2025, 7:15 a.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : The WPCOM Member plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.5. This is due to insufficient verification on the 'user_phone' parameter when logging in. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if SMS login is enabled. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T10:45:19.000000Z"}