Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Actively Exploiting WordPress Plugin Vulnerability to Gain Admin Access

Posted on October 9, 2025October 9, 2025 By CWS

Over the previous two months, risk actors have weaponized a essential authentication bypass flaw within the Service Finder Bookings WordPress plugin, enabling them to hijack any account on compromised websites.

First disclosed on July 31, 2025, the vulnerability emerged after a bug bounty submission revealed that the plugin’s servicefinderswitchback operate didn’t validate a user-switch cookie earlier than elevating privileges.

Attackers shortly reverse-engineered the weak spot, triggering mass exploitation campaigns that started on August 1 and intensified all through September.

Throughout this era, the Wordfence Firewall blocked greater than 13,800 exploit makes an attempt throughout 1000’s of web sites operating affected variations.

In its preliminary probing part, adversaries despatched specifically crafted HTTP requests that included a malicious originaluserid cookie, bypassing authentication completely.

Wordfence analysts famous the sudden uptick in irregular switchback requests inside hours of public disclosure, prompting the speedy deployment of a firewall rule for all Wordfence Premium, Care, and Response clients.

CVE IDAffected PluginVersions AffectedPatched VersionCVSS 3.1 ScoreAttack VectorCVE-2025-5947Service Finder Bookings≤ 6.06.19.8Authentication Bypass

Websites utilizing the free model acquired safety after a 30-day delay, leaving many installations uncovered till mid-July.

The impression of profitable exploitation is catastrophic: an unauthenticated actor good points full administrator privileges, permitting set up of backdoors, information exfiltration, or website defacement.

With over 6,000 lively installs of the weak plugin, the risk panorama widened as scanning bots and scripted exploit kits started probing for Service Finder Bookings endpoints.

An infection Mechanism

A better have a look at the exploit reveals that attackers goal the servicefinderswitchback endpoint by sending a GET request to ?switchback=1 with the Cookie: originaluserid=.

The plugin code then invokes:-

if ( isset( $_COOKIE[‘originaluserid’] ) ) {
$originaluserid = intval( $_COOKIE[‘originaluserid’] );
wp_set_current_user( $originaluserid );
wp_set_auth_cookie( $originaluserid, true );
}

As a result of neither authentication nor nonce checks are carried out, the attacker’s provided person ID is accepted unconditionally, logging them in as that person—typically the positioning administrator.

This easy but highly effective bypass underscores the significance of rigorous enter validation in session-handling routines.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Access, Actively, Admin, Exploiting, Gain, Hackers, Plugin, Vulnerability, WordPress

Post navigation

Previous Post: Threat Actors Mimic as HR Departments to Steal Your Gmail Login Credentials
Next Post: New Quishing Attack With Weaponized QR Code Targeting Microsoft Users

Related Posts

Threats Actors Leverage Python-based Malware to Inject Process into a Legitimate Windows Binary Cyber Security News
Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide Cyber Security News
Hackers Actively Exploiting WordPress Arbitrary Installation Vulnerabilities in The Wild Cyber Security News
Splunk Address Third Party Packages Vulnerabilities in Enterprise Versions Cyber Security News
Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity Cyber Security News
NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark