
Cloud Vulnerability DB
A community-led vulnerabilities database
The OTP Login Woocommerce & Gravity Forms plugin for WordPress (versions up to 2.2) contains an authentication bypass vulnerability (CVE-2023-2706) discovered in May 2023. The vulnerability affects the plugin's OTP code generation mechanism for user login via phone number, where the codes are exposed in AJAX responses (NVD).
The vulnerability stems from an implementation flaw where OTP codes generated for user authentication are returned in AJAX responses. This exposes the codes to potential attackers, who could intercept them and gain unauthorized access. The vulnerability has been assigned a CVSS v3.1 base score of 8.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a high-severity issue with network attack vector and no privileges required (NVD).
If successfully exploited, this vulnerability allows unauthenticated attackers to obtain login codes for administrator accounts. The primary prerequisite is that the attacker must have access to the phone number configured for the target account, which could be obtained through social engineering or reconnaissance (NVD).
Users should upgrade to version 2.3 or later of the OTP Login Woocommerce & Gravity Forms plugin, which contains fixes for this vulnerability (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."