PT-2026-2847 · Unknown · Modular Ds
Teemu Saarentaus
·
Published
2026-01-14
·
Updated
2026-01-16
·
CVE-2026-23550
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Modular DS versions prior to 2.5.2
Description
A critical vulnerability exists in Modular DS, allowing unauthenticated attackers to gain administrative access to WordPress sites. This is due to a flaw in the plugin's routing mechanism, specifically within exposed routes under
/api/modular-connector/, which allows bypassing authentication. The issue is actively exploited in the wild, with attacks observed starting January 13, 2026. The vulnerability impacts over 40,000 active installations. Attackers can exploit this weakness by manipulating requests to the /api/modular-connector/login/ endpoint, effectively bypassing the authentication barrier. This allows for actions such as remote logins and access to sensitive data, potentially leading to full site compromise, including the introduction of malware or redirection to phishing scams.Recommendations
Update the Modular DS plugin to version 2.5.2 or newer.
Exploit
Fix
LPE
Incorrect Privilege Assignment
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2026-23550
Affected Products
Modular Ds
References · 24
- 🔥 https://patchstack.com/articles/critical-privilege-escalation-vulnerability-in-modular-ds-plugin-affecting-40k-sites-exploited-in-the-wild · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2026-23550 · Security Note
- https://help.modulards.com/en/article/modular-ds-security-release-modular-connector-252-dm3mv0 · Vendor Advisory
- https://twitter.com/TheHackerWire/status/2011377737609679311 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1qdngky/critical_wordpress_modular_ds_plugin_flaw · Reddit Post
- https://twitter.com/Anavem_/status/2011921829481402492 · Twitter Post
- https://twitter.com/IT_news_for_all/status/2011827023543521339 · Twitter Post
- https://twitter.com/HurayraIIT/status/2011452577897226588 · Twitter Post
- https://twitter.com/CveFindCom/status/2011372492992987638 · Twitter Post
- https://twitter.com/ThreatSynop/status/2011833896657191237 · Twitter Post
- https://twitter.com/0xT3chn0m4nc3r/status/2011830928847286420 · Twitter Post
- https://twitter.com/CVEnew/status/2011382967277322598 · Twitter Post
- https://twitter.com/IT_news_for_all/status/2011827026492006663 · Twitter Post
- https://twitter.com/NovaSignal/status/2011840945340498384 · Twitter Post
- https://twitter.com/TheHackersNews/status/2011824214064669139 · Twitter Post