top of page
perceptive_background_267k.jpg

Hackers exploit Modular DS WordPress plugin flaw for admin access

Published:

15 januari 2026 om 20:49:50

Alert date:

15 januari 2026 om 22:02:37

Source:

bleepingcomputer.com

Click to open the original link from this advisory

Web Technologies, Zero-Day Vulnerabilities, Identity & Access

Hackers are actively exploiting a maximum severity flaw in the Modular DS WordPress plugin that allows remote authentication bypass and admin-level access to vulnerable sites. The vulnerability is being exploited in the wild to gain administrative privileges on WordPress websites running the affected plugin.

Technical details

CVE-2026-23550 is caused by design and implementation flaws including accepting requests as trusted when 'direct request' mode is activated without cryptographic verification of origin. The vulnerability exposes sensitive routes and activates automatic admin login fallback mechanism. In AuthController.php method getLogin(), when no specific user ID is provided in request body, the plugin fetches existing admin or super admin user and automatically logs in as that user. The flaw allows unauthenticated users to access privileged functionality and achieve immediate privilege escalation to admin-level access.

Mitigation steps:

Upgrade Modular DS to version 2.5.2 or later immediately. Review server access logs for suspicious requests. Check admin users for rogue additions. Regenerate all WordPress salts after updating to the most recent version.

Affected products:

Modular DS WordPress plugin versions 2.5.1 and older

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page