Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access

Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access

Posted on January 15, 2026January 15, 2026 By CWS

Jan 15, 2026Ravie LakshmananWeb Safety /Vulnerability
A maximum-severity safety flaw in a WordPress plugin referred to as Modular DS has come underneath lively exploitation within the wild, in line with Patchstack.
The vulnerability, tracked as CVE-2026-23550 (CVSS rating: 10.0), has been described as a case of unauthenticated privilege escalation impacting all variations of the plugin previous to and together with 2.5.1. It has been patched in model 2.5.2. The plugin has greater than 40,000 lively installs.
“In variations 2.5.1 and under, the plugin is susceptible to privilege escalation, as a result of a mix of things together with direct route choice, bypassing of authentication mechanisms, and auto-login as admin,” Patchstack stated.
The issue is rooted in its routing mechanism, which is designed to place sure delicate routes behind an authentication barrier. The plugin exposes its routes underneath the “/api/modular-connector/” prefix.

Nevertheless, it has been discovered that this safety layer could be bypassed each time the “direct request” is enabled by supplying an “origin” parameter set to “mo” and a “kind” parameter set to any worth (e.g., “origin=mo&kind=xxx”). This causes the request to be handled as a Modular direct request.
“Subsequently, as quickly as the positioning has already been linked to Modular (tokens current/renewable), anybody can go the auth middleware: there isn’t a cryptographic hyperlink between the incoming request and Modular itself,” Patchstack defined.
“This exposes a number of routes, together with /login/, /server-information/, /supervisor/, and /backup/, which permit numerous actions to be carried out, starting from distant login to acquiring delicate system or consumer knowledge.”
Because of this loophole, an unauthenticated attacker can exploit the “/login/{modular_request}” path to get administrator entry, leading to privilege escalation. This might then pave the way in which for a full web site compromise, allowing an attacker to introduce malicious adjustments, stage malware, or redirect customers to scams.
In keeping with particulars shared by the WordPress safety firm, assaults exploiting the flaw are stated to have first been detected on January 13, 2026, at round 2 a.m. UTC, with HTTP GET calls to the endpoint “/api/modular-connector/login/” adopted by makes an attempt to create an admin consumer.
The assaults have originated from the next IP addresses –

In gentle of lively exploitation of CVE-2026-23550, customers of the plugin are suggested to replace to a patched model as quickly as attainable.
“This vulnerability highlights how harmful implicit belief in inner request paths could be when uncovered to the general public web,” Patchstack stated.
“On this case, the difficulty was not brought on by a single bug, however by a number of design decisions mixed collectively: URL-based route matching, a permissive ‘direct request’ mode, authentication based mostly solely on the positioning connection state, and a login movement that robotically falls again to an administrator account.”

The Hacker News Tags:Access, Actively, Admin, Critical, Exploited, Flaw, Gain, Modular, Plugin, WordPress

Post navigation

Previous Post: Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot
Next Post: Cloudflare Acquires Human Native to Strengthen AI Data Security

Related Posts

SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances The Hacker News
Apple Blocks  Billion in Fraud Over 5 Years Amid Rising App Store Threats Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats The Hacker News
Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries The Hacker News
Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading The Hacker News
Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More The Hacker News
Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News