Actively exploited critical flaw in Modular DS WordPress plugin enables admin takeover
Modular DS WordPress插件存在严重漏洞(CVE-2026-23550),CVSS评分为10分。该漏洞允许攻击者通过未授权的特权提升接管管理员账户。攻击者可利用直接路由访问绕过身份验证机制,并触发自动管理员登录。此漏洞已影响4.5万次安装,并已被积极利用进行攻击。建议用户立即更新至修复版本以避免风险。 2026-1-16 08:26:7 Author: securityaffairs.com(查看原文) 阅读量:1 收藏

Actively exploited critical flaw in Modular DS WordPress plugin enables admin takeover

A critical Modular DS WordPress flaw (CVE-2026-23550) is actively exploited, enabling unauthenticated privilege escalation.

Threat actors are actively exploiting a critical Modular DS WordPress vulnerability tracked as CVE-2026-23550 (CVSS score of 10).

Modular DS is a WordPress plugin with over 40,000 installs that helps manage multiple sites, enabling monitoring, updates, and remote administration.

In plugin versions 2.5.1 and earlier, the flaw allows attackers to escalate privileges by abusing direct route access, bypassing authentication checks and triggering automatic admin login.

“In versions 2.5.1 and below, the plugin is vulnerable to privilege escalation, due to a combination of factors including direct route selection, bypassing of authentication mechanisms, and auto-login as admin.” reads the report published by cybersecurity firm Patchstack.

The plugin exposes API routes under /api/modular-connector/ protected by an auth middleware, but authentication can be bypassed via a flawed isDirectRequest() check. By simply setting origin=mo and a type parameter, requests are treated as trusted “direct” requests without any signature, secret, IP, or User-Agent validation. If the site is already connected to Modular, attackers can access sensitive routes (e.g., login, system info, backups), enabling unauthorized actions and data access.

“There is no verification of a signature, secret, IP, or mandatory User-Agent: the simple pair origin=mo&type=xxx is enough for the request to be considered as a Modular direct request.” continues the report. “As well, when the request is considered “direct”, the auth middleware in vendor/ares/framework/src/Foundation/Auth/ModularGuard.php only checks if the site is connected to Modular via the validateOrRenewAccessToken() function.”

Once a site is connected to Modular, missing cryptographic validation lets anyone bypass auth middleware, exposing routes like /login and /backup for remote access and data theft.

The issue was fixed in v2.5.2 by removing URL-based route matching, adding a default 404 route, and restricting route binding to recognized request types only.

Security researchers say attacks began on January 13, 2026, targeting the plugin’s login API to gain admin access and create new admin users. The activity came from two known IP addresses (45.11.89[.]19, 185.196.0[.]11). Users are strongly urged to update to the fixed version immediately to stay protected.

“This vulnerability highlights how dangerous implicit trust in internal request paths can be when exposed to the public internet,” Patchstack concludes. “In this case, the issue was not caused by a single bug, but by several design choices combined together: URL-based route matching, a permissive ‘direct request’ mode, authentication based only on the site connection state, and a login flow that automatically falls back to an administrator account.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Modular DS WordPress)




文章来源: https://securityaffairs.com/186976/security/actively-exploited-critical-flaw-in-modular-ds-wordpress-plugin-enables-admin-takeover.html
如有侵权请联系:admin#unsafe.sh