Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
嗯,用户让我帮忙总结一篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要仔细阅读文章,抓住主要信息。 文章讲的是WordPress插件Modular DS的一个高危漏洞,CVE编号是2026-23550,CVSS评分10分。这个漏洞允许未经认证的攻击者进行权限提升,影响到所有2.5.1及以下版本的插件。攻击者可以利用这个漏洞登录管理员账户,进而控制整个网站。 接下来,我需要把重点信息浓缩到100字以内。包括漏洞名称、影响范围、CVSS评分、攻击方式以及建议更新版本。同时,要避免使用开头语句,直接描述内容。 可能会这样组织语言:“WordPress插件Modular DS被发现存在严重安全漏洞(CVE-2026-23550),CVSS评分为10.0。该漏洞允许未经认证的攻击者通过特定API路径实现权限提升,并获取管理员访问权限。受影响版本为2.5.1及以下,已修复于2.5.2版本。建议用户立即更新以避免潜在的安全风险。” 这样既涵盖了关键点,又符合用户的要求。 </think> WordPress插件Modular DS被发现存在严重安全漏洞(CVE-2026-23550),CVSS评分为10.0。该漏洞允许未经认证的攻击者通过特定API路径实现权限提升,并获取管理员访问权限。受影响版本为2.5.1及以下,已修复于2.5.2版本。建议用户立即更新以避免潜在的安全风险。 2026-1-15 15:31:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Web Security /Vulnerability

A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according to Patchstack.

The vulnerability, tracked as CVE-2026-23550 (CVSS score: 10.0), has been described as a case of unauthenticated privilege escalation impacting all versions of the plugin prior to and including 2.5.1. It has been patched in version 2.5.2. The plugin has more than 40,000 active installs.

"In versions 2.5.1 and below, the plugin is vulnerable to privilege escalation, due to a combination of factors including direct route selection, bypassing of authentication mechanisms, and auto-login as admin," Patchstack said.

The problem is rooted in its routing mechanism, which is designed to put certain sensitive routes behind an authentication barrier. The plugin exposes its routes under the "/api/modular-connector/" prefix.

Cybersecurity

However, it has been found that this security layer can be bypassed every time the "direct request" is enabled by supplying an "origin" parameter set to "mo" and a "type" parameter set to any value (e.g., "origin=mo&type=xxx"). This causes the request to be treated as a Modular direct request.

"Therefore, as soon as the site has already been connected to Modular (tokens present/renewable), anyone can pass the auth middleware: there is no cryptographic link between the incoming request and Modular itself," Patchstack explained.

"This exposes several routes, including /login/, /server-information/, /manager/, and /backup/, which allow various actions to be performed, ranging from remote login to obtaining sensitive system or user data."

As a result of this loophole, an unauthenticated attacker can exploit the "/login/{modular_request}" route to get administrator access, resulting in privilege escalation. This could then pave the way for a full site compromise, permitting an attacker to introduce malicious changes, stage malware, or redirect users to scams.

According to details shared by the WordPress security company, attacks exploiting the flaw are said to have first been detected on January 13, 2026, at around 2 a.m. UTC, with HTTP GET calls to the endpoint "/api/modular-connector/login/" followed by attempts to create an admin user.

The attacks have originated from the following IP addresses -

Cybersecurity

In light of active exploitation of CVE-2026-23550, users of the plugin are advised to update to a patched version as soon as possible.

"This vulnerability highlights how dangerous implicit trust in internal request paths can be when exposed to the public internet," Patchstack said.

"In this case, the issue was not caused by a single bug, but by several design choices combined together: URL-based route matching, a permissive 'direct request' mode, authentication based only on the site connection state, and a login flow that automatically falls back to an administrator account."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/critical-wordpress-modular-ds-plugin.html
如有侵权请联系:admin#unsafe.sh