modulards.com: Critical WordPress Plugin Vulnerability Exploited in the Wild to Gain Instant Admin Access

modulards.com: Critical WordPress Plugin Vulnerability Exploited in the Wild to Gain Instant Admin Access

Critical Privilege Escalation Flaw in Modular DS WordPress Plugin Exploited in the Wild

A severe unauthenticated privilege escalation vulnerability in the Modular DS WordPress plugin has been actively exploited, allowing attackers to gain instant admin access to affected sites. The flaw, tracked as CVE-2026-23550 (CVSS 10.0), impacts over 40,000 sites running versions up to 2.5.1 of the plugin.

Developed by modulards.com, Modular DS enables remote management of WordPress sites, including updates, monitoring, and backups. The vulnerability stems from a flaw in the plugin’s Laravel-like router at /api/modular-connector/, where certain protected routes could be accessed before authentication and token validation middleware were applied. Attackers exploited this by triggering a "direct request" mode using parameters like origin=mo and an arbitrary type value, bypassing auth checks.

Once exploited, the flaw exposed routes such as /login/{modular_request}, where the AuthController could auto-log an attacker as an admin via getAdminUser() if no user ID was specified. Successful attacks created backdoor admin accounts with names like "PoC Admin" and fake email addresses.

Exploitation began on January 13, 2026, around 2 AM UTC, with attackers targeting the /api/modular-connector/login/ endpoint. Patchstack identified multiple malicious IPs involved in scans, login probes, and admin account creation, including:

  • 45.11.89[.]19 (Initial scans)
  • 162.158.123[.]41 (Login probes)
  • 172.70.176[.]95 (Admin creation)
  • 172.70.176[.]52 (Persistence attempts)

The vendor released version 2.5.2, which mitigates the issue by removing URL-based route matching, enforcing type validation, and adding a default 404 fallback. Patchstack also deployed an automated mitigation rule to block exploits. Users are advised to update immediately and review logs for indicators of compromise (IOCs), including suspicious admin accounts.

The incident highlights risks posed by publicly exposed internal routing and underscores the need for stricter request validation in web applications.

Source: https://cybersecuritynews.com/wordpress-plugin-vulnerability-admin-access/

Modular DS cybersecurity rating report: https://www.rankiteo.com/company/modulards

"id": "MOD1768962709",
"linkid": "modulards",
"type": "Vulnerability",
"date": "1/2026",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'industry': 'Web Development, Content Management',
                        'location': 'Global',
                        'name': 'Modular DS WordPress Plugin Users',
                        'size': 'Over 40,000 sites',
                        'type': 'Software/Plugin'}],
 'attack_vector': 'Unauthenticated Remote Exploitation',
 'customer_advisories': 'Users advised to update immediately and review logs '
                        'for indicators of compromise (IOCs).',
 'date_detected': '2026-01-13T02:00:00Z',
 'description': 'A severe unauthenticated privilege escalation vulnerability '
                'in the Modular DS WordPress plugin has been actively '
                'exploited, allowing attackers to gain instant admin access to '
                'affected sites. The flaw, tracked as CVE-2026-23550 (CVSS '
                '10.0), impacts over 40,000 sites running versions up to 2.5.1 '
                'of the plugin. The vulnerability stems from a flaw in the '
                'plugin’s Laravel-like router at `/api/modular-connector/`, '
                'where certain protected routes could be accessed before '
                'authentication and token validation middleware were applied. '
                "Attackers exploited this by triggering a 'direct request' "
                'mode using parameters like `origin=mo` and an arbitrary '
                '`type` value, bypassing auth checks. Successful attacks '
                "created backdoor admin accounts with names like 'PoC Admin' "
                'and fake email addresses.',
 'impact': {'operational_impact': 'Unauthorized admin access, potential site '
                                  'takeover',
            'systems_affected': 'Over 40,000 WordPress sites'},
 'initial_access_broker': {'backdoors_established': 'Backdoor admin accounts '
                                                    "(e.g., 'PoC Admin')",
                           'entry_point': '/api/modular-connector/login/'},
 'investigation_status': 'Ongoing',
 'lessons_learned': 'Highlights risks posed by publicly exposed internal '
                    'routing and underscores the need for stricter request '
                    'validation in web applications.',
 'post_incident_analysis': {'corrective_actions': 'Removed URL-based route '
                                                  'matching, enforced type '
                                                  'validation, added default '
                                                  '404 fallback.',
                            'root_causes': 'Flaw in Laravel-like router '
                                           'allowing access to protected '
                                           'routes before authentication and '
                                           'token validation middleware were '
                                           'applied.'},
 'recommendations': 'Update to version 2.5.2 immediately, review logs for '
                    'suspicious admin accounts, and enforce stricter request '
                    'validation.',
 'references': [{'source': 'Patchstack'}],
 'response': {'containment_measures': 'Vendor released version 2.5.2 to '
                                      'mitigate the issue',
              'recovery_measures': 'Users advised to update immediately and '
                                   'review logs for IOCs',
              'remediation_measures': 'Removed URL-based route matching, '
                                      'enforced type validation, added default '
                                      '404 fallback',
              'third_party_assistance': 'Patchstack (automated mitigation '
                                        'rule)'},
 'title': 'Critical Privilege Escalation Flaw in Modular DS WordPress Plugin '
          'Exploited in the Wild',
 'type': 'Privilege Escalation',
 'vulnerability_exploited': 'CVE-2026-23550 (CVSS 10.0)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.