Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws

Posted on May 7, 2025May 9, 2025 By CWS No Comments on OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws

Could 07, 2025Ravie LakshmananVulnerability / Net Safety
A second safety flaw impacting the OttoKit (previously SureTriggers) WordPress plugin has come below lively exploitation within the wild.
The vulnerability, tracked as CVE-2025-27007 (CVSS rating: 9.8), is a privilege escalation bug impacting all variations of the plugin previous to and together with model 1.0.82.
“That is as a result of create_wp_connection() perform lacking a functionality test and insufficiently verifying a consumer’s authentication credentials,” Wordfence mentioned. “This makes it potential for unauthenticated attackers to ascertain a connection, which in the end could make privilege escalation potential.”

That mentioned, the vulnerability is exploitable solely in two potential situations –

When a web site has by no means enabled or used an utility password, and OttoKit has by no means been related to the web site utilizing an utility password earlier than
When an attacker has authenticated entry to a web site and might generate a legitimate utility password

Wordfence revealed that it noticed the menace actors trying to take advantage of the preliminary connection vulnerability to ascertain a reference to the positioning, adopted through the use of it to create an administrative consumer account through the automation/motion endpoint.

Moreover, the assault makes an attempt concurrently intention for CVE-2025-3102 (CVSS rating: 8.1), one other flaw in the identical plugin that has additionally been exploited within the wild since final month.
This has raised the chance that the menace actors are opportunistically scanning WordPress installations to see if they’re vulnerable to both of the 2 flaws. The IP addresses which were noticed concentrating on the vulnerabilities are listed beneath –

2a0b:4141:820:1f4::2
41.216.188.205
144.91.119.115
194.87.29.57
196.251.69.118
107.189.29.12
205.185.123.102
198.98.51.24
198.98.52.226
199.195.248.147

On condition that the plugin has over 100,000 lively installations, it is important that customers transfer rapidly to use the newest patches (model 1.0.83).
“Attackers could have began actively concentrating on this vulnerability as early as Could 2, 2025 with mass exploitation beginning on Could 4, 2025,” Wordfence mentioned.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:100K, Exploits, Flaws, Hit, Installs, Multiple, OttoKit, Plugin, Targeting, WordPress

Post navigation

Previous Post: US Sanctions Myanmar Militia Involved in Cyber Scams 
Next Post: Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks

Related Posts

Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas The Hacker News
Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks The Hacker News
Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms The Hacker News
Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware The Hacker News
Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion The Hacker News
Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network The Hacker News

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News