Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access

The Hacker News by The Hacker News
January 15, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Jan 15, 2026Ravie LakshmananWeb Security /Vulnerability

A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according to Patchstack.

The vulnerability, tracked as CVE-2026-23550 (CVSS score: 10.0), has been described as a case of unauthenticated privilege escalation impacting all versions of the plugin prior to and including 2.5.1. It has been patched in version 2.5.2. The plugin has more than 40,000 active installs.

“In versions 2.5.1 and below, the plugin is vulnerable to privilege escalation, due to a combination of factors including direct route selection, bypassing of authentication mechanisms, and auto-login as admin,” Patchstack said.

The problem is rooted in its routing mechanism, which is designed to put certain sensitive routes behind an authentication barrier. The plugin exposes its routes under the “/api/modular-connector/” prefix.

Cybersecurity

However, it has been found that this security layer can be bypassed every time the “direct request” is enabled by supplying an “origin” parameter set to “mo” and a “type” parameter set to any value (e.g., “origin=mo&type=xxx”). This causes the request to be treated as a Modular direct request.

“Therefore, as soon as the site has already been connected to Modular (tokens present/renewable), anyone can pass the auth middleware: there is no cryptographic link between the incoming request and Modular itself,” Patchstack explained.

“This exposes several routes, including /login/, /server-information/, /manager/, and /backup/, which allow various actions to be performed, ranging from remote login to obtaining sensitive system or user data.”

As a result of this loophole, an unauthenticated attacker can exploit the “/login/{modular_request}” route to get administrator access, resulting in privilege escalation. This could then pave the way for a full site compromise, permitting an attacker to introduce malicious changes, stage malware, or redirect users to scams.

According to details shared by the WordPress security company, attacks exploiting the flaw are said to have first been detected on January 13, 2026, at around 2 a.m. UTC, with HTTP GET calls to the endpoint “/api/modular-connector/login/” followed by attempts to create an admin user.

The attacks have originated from the following IP addresses –

Cybersecurity

In light of active exploitation of CVE-2026-23550, users of the plugin are advised to update to a patched version as soon as possible.

“This vulnerability highlights how dangerous implicit trust in internal request paths can be when exposed to the public internet,” Patchstack said.

“In this case, the issue was not caused by a single bug, but by several design choices combined together: URL-based route matching, a permissive ‘direct request’ mode, authentication based only on the site connection state, and a login flow that automatically falls back to an administrator account.”



Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
Microsoft expands its commitment to education with Elevate for Educators Program and new AI-powered tools

Microsoft expands its commitment to education with Elevate for Educators Program and new AI-powered tools

Recommended.

Cyble Recognized as a Sample Vendor in Three Gartner® Hype Cycle™ Reports for the Second Consecutive Year

Cyble Recognized as a Sample Vendor in Three Gartner® Hype Cycle™ Reports for the Second Consecutive Year

July 14, 2025
Oracle Q4 Earnings: Ellison Criticizes Salesforce Over Product Integration

Oracle Q4 Earnings: Ellison Criticizes Salesforce Over Product Integration

June 12, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio