{"vulnerability": "cve-2025-1475", "sightings": [{"uuid": "1ebedb20-91b5-4b62-b319-d392ff29ef34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1475", "type": "seen", "source": "https://t.me/codeb0ss/1703", "content": "{VIP} CVE-2025-1475 - [WPCOM Member-Plugin] &lt; Authentication Bypass via user_phone,\n\nThe new kind of Wordpress exp in (wpcomMember) plugin that you can bypass the account by one the phone number, its the premium exp that you can bypass any countries.\n\nThis exp installed in the VIP.", "creation_timestamp": "2025-03-16T23:15:05.000000Z"}, {"uuid": "9d743c0c-1f2e-4c02-ac54-5cc4fc79e9b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14758", "type": "seen", "source": "https://gist.github.com/Darkcrai86/cc5029452b4523ee8490cfdf43dac666", "content": "", "creation_timestamp": "2025-12-16T08:01:50.000000Z"}, {"uuid": "44f3036c-1be1-455e-b07a-3b38c8afd38d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1475", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljrlz5bvjy2q", "content": "", "creation_timestamp": "2025-03-07T08:34:39.498020Z"}, {"uuid": "23b34041-339a-42e4-8401-5cbfa900bfb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1475", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114120519423994448", "content": "", "creation_timestamp": "2025-03-07T09:48:55.769704Z"}, {"uuid": "36804d7a-245e-441e-96dc-a8cc04537415", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1475", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:23.000000Z"}, {"uuid": "0dbbe4b0-0522-44b5-ad49-e343b7471c2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1475", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:43.000000Z"}, {"uuid": "bcc02a8c-13c5-4aa4-be7e-09d27676347b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14756", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3mdlgo35pwi22", "content": "", "creation_timestamp": "2026-01-29T18:38:04.493367Z"}, {"uuid": "b7547084-7090-4a30-8cd3-8d98fa1ef3d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14756", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mde3vnmenn2n", "content": "", "creation_timestamp": "2026-01-26T20:36:47.542556Z"}, {"uuid": "b072be12-203d-455a-b501-8073a392fdf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14750", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-05", "content": "", "creation_timestamp": "2026-01-22T11:00:00.000000Z"}, {"uuid": "779dc543-5f0a-4b1b-b531-f26d7fe6262a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14751", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-05", "content": "", "creation_timestamp": "2026-01-22T11:00:00.000000Z"}, {"uuid": "a45633b8-0cf7-4209-b10f-5a2199231773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1475", "type": "seen", "source": "Telegram/V9cz3os2Fxqm3nqas3O48Ujst78Qvs1MoHGPmQ9MreOE6B_3", "content": "", "creation_timestamp": "2025-03-08T04:34:56.000000Z"}, {"uuid": "1e494bfc-2046-44d9-8d92-2aaad8d28b6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1475", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6806", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1475\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The WPCOM Member plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.5. This is due to insufficient verification on the 'user_phone' parameter when logging in. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if SMS login is enabled.\n\ud83d\udccf Published: 2025-03-07T06:40:02.364Z\n\ud83d\udccf Modified: 2025-03-07T06:40:02.364Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/05178bf3-3040-41aa-ba43-779376d30298?source=cve\n2. https://plugins.trac.wordpress.org/browser/wpcom-member/tags/1.7.1/includes/form-validation.php#L110\n3. https://plugins.trac.wordpress.org/changeset/3248208/", "creation_timestamp": "2025-03-07T07:37:20.000000Z"}, {"uuid": "b1dde746-fb4f-4d2c-9f12-626cf44757a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1475", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljt7pykmdd2h", "content": "", "creation_timestamp": "2025-03-08T00:00:07.983455Z"}, {"uuid": "93366440-c313-4934-9f35-14680bb53c58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1475", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljuhxgz4ed2x", "content": "", "creation_timestamp": "2025-03-08T12:00:06.254216Z"}, {"uuid": "47b281eb-25e0-4371-ada3-efdbbeb64c89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14757", "type": "seen", "source": "https://gist.github.com/Darkcrai86/b00ea4c9c6b92db6ef9763f8eda8d6eb", "content": "", "creation_timestamp": "2026-01-16T10:17:28.000000Z"}, {"uuid": "6144f35f-91c2-4ccc-a746-e5faabebf58e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14757", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mcjyyhftv52c", "content": "", "creation_timestamp": "2026-01-16T11:35:27.024596Z"}, {"uuid": "cd221fe4-7dca-4f5c-a27e-4806631751f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-14756", "type": "seen", "source": "https://bsky.app/profile/cyber-news-fi.bsky.social/post/3mdhdclewcz2a", "content": "", "creation_timestamp": "2026-01-28T03:27:20.407133Z"}, {"uuid": "ec4fb58f-1dba-4e72-9641-1e3662a8a76a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1475", "type": "seen", "source": "https://t.me/cvedetector/19797", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1475 - WordPress WPCOM Member Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1475 \nPublished : March 7, 2025, 7:15 a.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : The WPCOM Member plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.5. This is due to insufficient verification on the 'user_phone' parameter when logging in. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if SMS login is enabled. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T10:45:19.000000Z"}]}