• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access

You are here: Home / General Cyber Security News / Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
January 15, 2026

A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according to Patchstack.

The vulnerability, tracked as CVE-2026-23550 (CVSS score: 10.0), has been described as a case of unauthenticated privilege escalation impacting all versions of the plugin prior to and including 2.5.1. It has been patched in version 2.5.2. The plugin has more than 40,000 active installs.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“In versions 2.5.1 and below, the plugin is vulnerable to privilege escalation, due to a combination of factors including direct route selection, bypassing of authentication mechanisms, and auto-login as admin,” Patchstack said.

The problem is rooted in its routing mechanism, which is designed to put certain sensitive routes behind an authentication barrier. The plugin exposes its routes under the “/api/modular-connector/” prefix.

Cybersecurity

However, it has been found that this security layer can be bypassed every time the “direct request” is enabled by supplying an “origin” parameter set to “mo” and a “type” parameter set to any value (e.g., “origin=mo&type=xxx”). This causes the request to be treated as a Modular direct request.

“Therefore, as soon as the site has already been connected to Modular (tokens present/renewable), anyone can pass the auth middleware: there is no cryptographic link between the incoming request and Modular itself,” Patchstack explained.

“This exposes several routes, including /login/, /server-information/, /manager/, and /backup/, which allow various actions to be performed, ranging from remote login to obtaining sensitive system or user data.”

As a result of this loophole, an unauthenticated attacker can exploit the “/login/{modular_request}” route to get administrator access, resulting in privilege escalation. This could then pave the way for a full site compromise, permitting an attacker to introduce malicious changes, stage malware, or redirect users to scams.

According to details shared by the WordPress security company, attacks exploiting the flaw are said to have first been detected on January 13, 2026, at around 2 a.m. UTC, with HTTP GET calls to the endpoint “/api/modular-connector/login/” followed by attempts to create an admin user.

The attacks have originated from the following IP addresses –

  • 45.11.89[.]19
  • 185.196.0[.]11

Cybersecurity

In light of active exploitation of CVE-2026-23550, users of the plugin are advised to update to a patched version as soon as possible.

“This vulnerability highlights how dangerous implicit trust in internal request paths can be when exposed to the public internet,” Patchstack said.

“In this case, the issue was not caused by a single bug, but by several design choices combined together: URL-based route matching, a permissive ‘direct request’ mode, authentication based only on the site connection state, and a login flow that automatically falls back to an administrator account.”

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «researchers reveal reprompt attack allowing single click data exfiltration from microsoft Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
  • Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot
  • ThreatsDay Bulletin: AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Stories
  • Model Security Is the Wrong Frame – The Real Risk Is Workflow Security
  • 4 Outdated Habits Destroying Your SOC’s MTTR in 2026
  • Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud
  • Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login
  • Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
  • AI Agents Are Becoming Privilege Escalation Paths
  • Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware

Copyright © TheCyberSecurity.News, All Rights Reserved.