Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
Home/Threats/New WordPress Backdoor Vulnerability Creates Malicious Admins
Threats

New WordPress Backdoor Vulnerability Creates Malicious Admins

A critical backdoor vulnerability has been identified within the LA-Studio Element Kit for Elementor, a widely adopted WordPress plugin currently active on over 20,000 sites. This security flaw...

Emy Elsamnoudy
Emy Elsamnoudy
January 23, 2026 2 Min Read
0 0

A critical backdoor vulnerability has been identified within the LA-Studio Element Kit for Elementor, a widely adopted WordPress plugin currently active on over 20,000 sites.

This security flaw allows attackers to create administrator accounts without any authentication, putting thousands of websites at risk of complete takeover.

The vulnerability, tracked as CVE-2026-0920, carries a CVSS score of 9.8, marking it as a critical threat that requires immediate action from site administrators.

The backdoor was introduced by a former employee who left the company in late December 2025. According to LA-Studio, the developer modified the plugin code shortly before their employment ended, inserting hidden functionality that allows unauthorized administrator account creation.

This incident highlights the growing concern around insider threats and the importance of code review processes during employee transitions.

Security researchers Athiwat Tiprasaharn, Itthidej Aramsri, and Waris Damkham discovered the vulnerability on January 12, 2026, and reported it through the Wordfence Bug Bounty Program.

Wordfence analysts identified the flaw within the plugin’s user registration system, specifically in the ajax_register_handle function. The vulnerability was patched quickly, with version 1.6.0 released on January 14, 2026, just two days after the initial report.

The vulnerability exists in all versions up to and including 1.5.6.3 of the LA-Studio Element Kit for Elementor plugin. Attackers can exploit this flaw by sending a specially crafted registration request containing the lakit_bkrole parameter.

Once successful, they gain full administrative access to the targeted WordPress site, allowing them to upload malicious files, modify content, redirect visitors to harmful websites, or inject spam content.

Vulnerability Details:-

Attribute Details
Vulnerability Name Unauthenticated Privilege Escalation via Backdoor to Administrative User Creation
CVE ID CVE-2026-0920
CVSS Score 9.8 (Critical)
Affected Plugin LA-Studio Element Kit for Elementor
Plugin Slug lastudio-element-kit
Affected Versions ≤ 1.5.6.3
Patched Version 1.6.0
Active Installations 20,000+
Attack Vector lakit_bkrole parameter in registration request
Vulnerability Type Backdoor / Administrative User Creation
Discoverers Athiwat Tiprasaharn, Itthidej Aramsri, Waris Damkham
Bounty Amount $975.00
Discovery Date January 12, 2026
Patch Release Date January 14, 2026
Wordfence Protection January 13, 2026 (Premium), February 12, 2026 (Free)

Wordfence researchers noted that the backdoor code was deliberately obfuscated to avoid detection during security reviews. This evasion technique made the malicious functionality harder to spot, allowing it to remain hidden within the plugin’s codebase.

The obfuscated code specifically targeted the user registration process, adding administrator capabilities to newly created accounts when the hidden parameter was present.

The Obfuscated Backdoor Mechanism

The backdoor operates through a carefully hidden modification within the plugin’s registration handling system.

When examining the code, Wordfence analysts found that the ajax_register_handle function contained obfuscated logic that checked for the presence of the lakit_bkrole parameter during user registration.

If this parameter was detected, the function would trigger additional filters that assigned administrator privileges to the newly created account.

The obfuscation included techniques like string manipulation and indirect function calls, making the malicious code blend seamlessly with legitimate plugin functionality.

This clever disguise allowed the backdoor to bypass standard security audits and remain undetected until researchers specifically investigated suspicious patterns in the registration workflow.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Fake Captcha Exploits Web Infrastructure to Deliver

Next Post

Threat Actors Use LNK Files to Deploy Moon Weaponizes MoonPeak

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us