Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Critical flaw in WordPress Modular DS plugin can be actively exploited to gain administrator access

Researchers uncover a re-prompting attack that allows data to be extracted from Microsoft Copilot with a single click

How one startup is using prebiotics to alleviate copper deficiency

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Critical flaw in WordPress Modular DS plugin can be actively exploited to gain administrator access
Identity

Critical flaw in WordPress Modular DS plugin can be actively exploited to gain administrator access

userBy userJanuary 15, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

January 15, 2026Ravi LakshmananWeb security/vulnerabilities

According to Patchstack, a maximum severity security flaw in a WordPress plugin called Modular DS is being exploited in the wild.

This vulnerability is tracked as CVE-2026-23550 (CVSS score: 10.0) and is described as a case of unauthenticated privilege escalation affecting all versions of the plugin prior to 2.5.1. Version 2.5.2 is patched. This plugin has over 40,000 active installations.

“Below version 2.5.1, the plugin is vulnerable to privilege escalation due to a combination of factors, including direct route selection, bypassing authentication mechanisms, and automatically logging in as an administrator,” Patchstack said.

The cause of this issue is a routing mechanism that is designed to put certain sensitive routes behind authentication barriers. The plugin exposes its routes with the “/api/modular-connector/” prefix.

cyber security

However, it has been found that by setting the “origin” parameter to “mo” and the “type” parameter to any value (e.g. “origin=mo&type=xxx”), this security layer can be bypassed whenever “direct requests” are enabled. This causes the request to be treated as a modular direct request.

“So once a site is already connected to Modular (token exists/can be refreshed), anyone can pass through the authentication middleware. There is no cryptographic link between incoming requests and Modular itself,” Patchstack explained.

“This exposes multiple routes, such as /login/, /server-information/, /manager/, and /backup/, allowing a variety of actions to be performed, from remote logins to retrieving sensitive system and user data.”

This loophole could allow an unauthenticated attacker to gain administrative access by abusing the “/login/{modular_request}” route, resulting in privilege escalation. This opens the way for the entire site to be compromised, allowing attackers to introduce malicious changes, stage malware, or redirect users to scams.

According to details shared by the WordPress security firm, an attack exploiting this flaw was said to have first been detected on January 13, 2026 at approximately 2:00 AM UTC via an HTTP GET call to the endpoint “/api/modular-connector/login/” followed by an attempt to create an administrator user.

The attack originated from the following IP address –

cyber security

Given the active exploitation of CVE-2026-23550, we recommend that users of the plugin update to a patched version as soon as possible.

“This vulnerability highlights how dangerous implicit trust in internal request paths can be when exposed to the public Internet,” Patchstack said.

“In this case, the issue was not caused by a single bug, but rather a combination of several design choices, including URL-based route matching, a permissive ‘direct request’ mode, authentication based solely on the site’s connectivity status, and a login flow that automatically falls back to an administrator account. ”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleResearchers uncover a re-prompting attack that allows data to be extracted from Microsoft Copilot with a single click
user
  • Website

Related Posts

Researchers uncover a re-prompting attack that allows data to be extracted from Microsoft Copilot with a single click

January 15, 2026

AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Stories

January 15, 2026

Model security is the wrong framework – the real risk is workflow security

January 15, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Critical flaw in WordPress Modular DS plugin can be actively exploited to gain administrator access

Researchers uncover a re-prompting attack that allows data to be extracted from Microsoft Copilot with a single click

How one startup is using prebiotics to alleviate copper deficiency

US senators demand answers from X, Meta, Alphabet and more on sexual deepfakes

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.