Orion SMS OTP Verification. Security & Risk Analysis

wordpress.org/plugins/orion-sms-otp-verification

SMS/OTP verification and Notification for all forms via Twilio or MSG91. So user can't submit form without verifying mobile number.

200 active installs v2.0.0 PHP 5.2.4+ WP 4.6+ Updated Feb 1, 2026
msg91sms-notificationtwiliotwilio-sms-wordpress-plugintwilio-wordpress-plugin
94
A · Safe
CVEs total1
Unpatched0
Last CVEOct 14, 2025
Download
Safety Verdict

Is Orion SMS OTP Verification. Safe to Use in 2026?

Generally Safe

Score 94/100

Orion SMS OTP Verification. has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Oct 14, 2025Updated 2mo ago
Risk Assessment

The "orion-sms-otp-verification" plugin, version 2.0.0, exhibits a mixed security posture. While the static analysis shows a promising lack of dangerous functions, raw SQL queries, and unprotected entry points, there are significant concerns regarding output escaping and a history of critical vulnerabilities. The fact that 33% of outputs are not properly escaped presents a potential cross-site scripting (XSS) risk if user-controlled data is rendered directly without sufficient sanitization.

The plugin's vulnerability history is a major red flag. The presence of a past critical vulnerability, specifically an "Authentication Bypass Using an Alternate Path or Channel," coupled with the reported "Last vulnerability" date in the future (which is likely a data anomaly but highlights historical critical issues), indicates that the plugin has previously suffered from severe security flaws. The absence of currently unpatched CVEs is positive, but the pattern of past critical issues necessitates a cautious approach.

In conclusion, while the plugin has improved in certain areas like securing its entry points and using prepared statements for SQL, the unescaped output and historical critical vulnerabilities prevent a fully confident security assessment. Users should be aware of the potential for XSS and the plugin's past susceptibility to authentication bypass, urging them to ensure the plugin is updated to the latest stable version and to monitor for future security advisories.

Key Concerns

  • Significant portion of output not properly escaped
  • History of 1 critical vulnerability (Auth Bypass)
Vulnerabilities
1

Orion SMS OTP Verification. Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Critical
1

1 total CVE

CVE-2025-9967critical · 9.8Authentication Bypass Using an Alternate Path or Channel

Orion SMS OTP Verification <= 1.1.7 - Authentication Bypass via Account Takeover

Oct 14, 2025 Patched in 2.0.0 (115d)
Code Analysis
Analyzed Mar 16, 2026

Orion SMS OTP Verification. Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
34
68 escaped
Nonce Checks
3
Capability Checks
0
File Operations
0
External Requests
6
Bundled Libraries
0

Output Escaping

67% escaped102 total outputs
Attack Surface

Orion SMS OTP Verification. Attack Surface

Entry Points6
Unprotected0

AJAX Handlers 6

authwp_ajax_ihs_otp_ajax_hookcustom-functions.php:291
noprivwp_ajax_ihs_otp_ajax_hookcustom-functions.php:292
authwp_ajax_ihs_verify_msg91custom-functions.php:366
noprivwp_ajax_ihs_verify_msg91custom-functions.php:367
authwp_ajax_ihs_verify_twiliocustom-functions.php:588
noprivwp_ajax_ihs_verify_twiliocustom-functions.php:589
WordPress Hooks 4
actionwp_enqueue_scriptscustom-functions.php:201
actionadmin_enqueue_scriptscustom-functions.php:236
actionadmin_menuinc\admin-settings.php:13
actionadmin_initinc\admin-settings.php:27
Maintenance & Trust

Orion SMS OTP Verification. Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 1, 2026
PHP min version5.2.4
Downloads40K

Community Trust

Rating96/100
Number of ratings119
Active installs200
Developer Profile

Orion SMS OTP Verification. Developer Profile

Imran Sayed

3 plugins · 210 total installs

74
trust score
Avg Security Score
93/100
Avg Patch Time
115 days
View full developer profile
Detection Fingerprints

How We Detect Orion SMS OTP Verification.

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/orion-sms-otp-verification/style.css/wp-content/plugins/orion-sms-otp-verification/vendor/js/main.js
Script Paths
/wp-content/plugins/orion-sms-otp-verification/vendor/js/main.js
Version Parameters
orion-sms-otp-verification/style.css?ver=1.0orion-sms-otp-verification/vendor/js/main.js?ver=1.0

HTML / DOM Fingerprints

CSS Classes
ihs-otp-verify-wrapihs-otp-verify-mobile-wrapihs-otp-verify-input-wrapihs-otp-verify-mobileihs-otp-verify-otp-wrapihs-otp-verify-otp-inputihs-otp-verify-btn-wrapihs-otp-verify-send-otp-btn+3 more
Data Attributes
data-form-selectordata-submit-btn-selectordata-input-requireddata-mobile-input-namedata-country-codedata-mobile-length+2 more
JS Globals
otp_obj
FAQ

Frequently Asked Questions about Orion SMS OTP Verification.