Article Details

Scrape Timestamp (UTC): 2025-05-07 13:47:49.393

Source: https://thehackernews.com/2025/05/ottokit-wordpress-plugin-with-100k.html

Original Article Text

Click to Toggle View

OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws. A second security flaw impacting the OttoKit (formerly SureTriggers) WordPress plugin has come under active exploitation in the wild. The vulnerability, tracked as CVE-2025-27007 (CVSS score: 9.8), is a privilege escalation bug impacting all versions of the plugin prior to and including version 1.0.82. "This is due to the create_wp_connection() function missing a capability check and insufficiently verifying a user's authentication credentials," Wordfence said. "This makes it possible for unauthenticated attackers to establish a connection, which ultimately can make privilege escalation possible." That said, the vulnerability is exploitable only in two possible scenarios - Wordfence revealed that it observed the threat actors attempting to exploit the initial connection vulnerability to establish a connection with the site, followed by using it to create an administrative user account via the automation/action endpoint. Furthermore, the attack attempts simultaneously aim for CVE-2025-3102 (CVSS score: 8.1), another flaw in the same plugin that has also been exploited in the wild since last month. This has raised the possibility that the threat actors are opportunistically scanning WordPress installations to see if they are susceptible to either of the two flaws. The IP addresses that have been observed targeting the vulnerabilities are listed below - Given that the plugin has over 100,000 active installations, it's essential that users move quickly to apply the latest patches (version 1.0.83). "Attackers may have started actively targeting this vulnerability as early as May 2, 2025 with mass exploitation starting on May 4, 2025," Wordfence said.

Daily Brief Summary

MALWARE // Exploits in OttoKit WordPress Plugin Affect Over 100K Sites

A second critical vulnerability in the OttoKit WordPress plugin is currently being exploited.

The flaw, identified as CVE-2025-27007 with a CVSS score of 9.8, allows for unauthenticated privilege escalation.

All plugin versions up to 1.0.82 are susceptible; users are urged to update to version 1.0.83 immediately.

The exploit involves unverified initial connections enabling attackers to create administrative accounts.

Attackers are also targeting a related vulnerability, CVE-2025-3102, suggesting a broader, coordinated attack.

Exploitation attempts have been observed since May 2, 2025, with a significant increase on May 4, 2025.

Due to over 100,000 installations, the impact potential of this exploit is extensive, affecting numerous WordPress sites globally.