By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
Computing

Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access

News Room
Last updated: 2026/01/15 at 11:02 AM
News Room Published 15 January 2026
Share
Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
SHARE

Jan 15, 2026Ravie LakshmananWeb Security /Vulnerability

A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according to Patchstack.

The vulnerability, tracked as CVE-2026-23550 (CVSS score: 10.0), has been described as a case of unauthenticated privilege escalation impacting all versions of the plugin prior to and including 2.5.1. It has been patched in version 2.5.2. The plugin has more than 40,000 active installs.

“In versions 2.5.1 and below, the plugin is vulnerable to privilege escalation, due to a combination of factors including direct route selection, bypassing of authentication mechanisms, and auto-login as admin,” Patchstack said.

The problem is rooted in its routing mechanism, which is designed to put certain sensitive routes behind an authentication barrier. The plugin exposes its routes under the “/api/modular-connector/” prefix.

Cybersecurity

However, it has been found that this security layer can be bypassed every time the “direct request” is enabled by supplying an “origin” parameter set to “mo” and a “type” parameter set to any value (e.g., “origin=mo&type=xxx”). This causes the request to be treated as a Modular direct request.

“Therefore, as soon as the site has already been connected to Modular (tokens present/renewable), anyone can pass the auth middleware: there is no cryptographic link between the incoming request and Modular itself,” Patchstack explained.

“This exposes several routes, including /login/, /server-information/, /manager/, and /backup/, which allow various actions to be performed, ranging from remote login to obtaining sensitive system or user data.”

As a result of this loophole, an unauthenticated attacker can exploit the “/login/{modular_request}” route to get administrator access, resulting in privilege escalation. This could then pave the way for a full site compromise, permitting an attacker to introduce malicious changes, stage malware, or redirect users to scams.

According to details shared by the WordPress security company, attacks exploiting the flaw are said to have first been detected on January 13, 2026, at around 2 a.m. UTC, with HTTP GET calls to the endpoint “/api/modular-connector/login/” followed by attempts to create an admin user.

The attacks have originated from the following IP addresses –

Cybersecurity

In light of active exploitation of CVE-2026-23550, users of the plugin are advised to update to a patched version as soon as possible.

“This vulnerability highlights how dangerous implicit trust in internal request paths can be when exposed to the public internet,” Patchstack said.

“In this case, the issue was not caused by a single bug, but by several design choices combined together: URL-based route matching, a permissive ‘direct request’ mode, authentication based only on the site connection state, and a login flow that automatically falls back to an administrator account.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Track 140+ Health Metrics With Your Finger and Save 33% on the Circular Ring 2 Track 140+ Health Metrics With Your Finger and Save 33% on the Circular Ring 2
Next Article Verizon Offering  Credit Following Major Outage, Here’s How to Get It Verizon Offering $20 Credit Following Major Outage, Here’s How to Get It
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Mystery over woolly rhino’s extinction solved after remains found in grim place
Mystery over woolly rhino’s extinction solved after remains found in grim place
News
Social Media Analytics Tools: Marketer’s Guide |
Computing
ChatGPT Has a New Language Translation Option for You
ChatGPT Has a New Language Translation Option for You
News
Is Pepeto the Next PEPE? Why This Meme Coin Has Investors Watching Closely | HackerNoon
Is Pepeto the Next PEPE? Why This Meme Coin Has Investors Watching Closely | HackerNoon
Computing

You Might also Like

Social Media Analytics Tools: Marketer’s Guide |

7 Min Read
Is Pepeto the Next PEPE? Why This Meme Coin Has Investors Watching Closely | HackerNoon
Computing

Is Pepeto the Next PEPE? Why This Meme Coin Has Investors Watching Closely | HackerNoon

9 Min Read
Seattle-area startup MontyCloud raises Series B round to boost cloud operations software
Computing

Seattle-area startup MontyCloud raises Series B round to boost cloud operations software

2 Min Read
Linux 7.0 To Expand Temperature Reporting For Intel Graphics Cards
Computing

Linux 7.0 To Expand Temperature Reporting For Intel Graphics Cards

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?