Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical Spring Vulnerabilities Expose Arbitrary Files and GCP Secrets
May 8, 2026
Dirty Frag Linux Vulnerability Allows Root Privileges Access
May 8, 2026
Next.js & React Server Components: Critical Vulnerabilities Pat
May 8, 2026
Home/CyberSecurity News/Critical WordPress Plugin Exploit Grants Instant Admin Access
CyberSecurity News

Critical WordPress Plugin Exploit Grants Instant Admin Access

Attackers are actively exploiting a critical unauthenticated privilege escalation vulnerability in the Modular DS WordPress plugin. This severe flaw grants instant administrative access to affected...

Jennifer sherman
Jennifer sherman
January 15, 2026 2 Min Read
2 0

Attackers are actively exploiting a critical unauthenticated privilege escalation vulnerability in the Modular DS WordPress plugin. This severe flaw grants instant administrative access to affected WordPress sites, with in-the-wild exploitation confirmed.

Affecting over 40,000 sites, the flaw in versions up to 2.5.1 has prompted urgent patches and mitigations from Patchstack and the vendor.

Modular DS, developed by modulards.com, enables remote management of multiple WordPress sites, including monitoring, updates, and backups.

According to Patchstack, the core issue stems from a flaw in the plugin’s Laravel-like router at /api/modular-connector/.

Attackers can trigger “direct request” mode using origin=mo and any type parameter, evading auth middleware if the site is connected to Modular services.

This exposes protected routes like /login/{modular_request}, where the AuthController auto-logs in as an admin user via getAdminUser() if no user ID is specified. No signatures, secrets, or IP checks validate requests, chaining to full compromise via actions like cache clearing, backups, or plugin installs.

CVE ID CVSS v3.1 Score Severity Affected Versions Fixed Version
CVE-2026-23550 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) ​ Critical <= 2.5.1 2.5.2

Active Exploitation and IOCs

Attacks began January 13, 2026, around 2 AM UTC, targeting /api/modular-connector/login/ with origin=mo&type=foo. Successful exploits create backdoor admins named like “PoC Admin” with fake emails. Patchstack detected matching attempts post-mitigation deployment.

Attacker IP Notes
45.11.89[.]19 Initial scans
162.158.123[.]41 Login probes
172.70.176[.]95 Admin creation
172.70.176[.]52 Persistence attempts

Version 2.5.2 removes URL-based route matching, adds a default 404 fallback, and enforces type validation (request, oauth, lb) before binding routes. Patchstack’s mitigation rule automatically blocks exploits.

Modular DS users must update immediately; enable auto-updates for vulnerable plugins. Scan logs for IOCs and revoke suspicious admins. This incident underscores the risks of publicly exposed permissive internal routing and emphasizes the need for cryptographic request validation.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Critical HPE Aruba Flaws Allow Unauthorized Access to Data

Next Post

Microsoft & Authorities Dismantle RedVDS BEC Attack Chain

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain
May 7, 2026
Hackers Use Fake Claude AI Installers to Infect Systems
May 7, 2026
UAT-8302 Uses Custom Malware and Open-Source Tools to Steal Data
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us