PT-2026-2847 · Unknown · Modular Ds
Teemu Saarentaus
·
Published
2026-01-14
·
Updated
2026-02-17
·
CVE-2026-23550
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Modular DS versions through 2.5.1
Description
A critical vulnerability exists in the Modular DS WordPress plugin that allows unauthenticated attackers to gain administrative access to affected websites. This flaw, tracked as CVE-2026-23550, is due to a broken access control mechanism stemming from incorrect routing and authentication logic. Specifically, the plugin’s handling of “direct request” mode allows attackers to bypass cryptographic verification and access sensitive routes, such as
/api/modular-connector/, leading to the issuance of admin session cookies without proper authentication. This enables attackers to log in as administrators and potentially take full control of the website, including the ability to create new admin users, inject malicious plugins, steal data, or deface the site. The vulnerability is actively being exploited in the wild, with exploitation attempts first observed on January 13, 2026. Over 40,000 WordPress installations are estimated to be at risk. The vulnerability is triggered by manipulating URL parameters, effectively bypassing the authentication barrier. The vulnerable component is the routing logic within the plugin, specifically the isDirectRequest() function.Recommendations
Update Modular DS to version 2.5.2 or newer.
Regenerate WordPress salts after updating to version 2.5.2.
Monitor WordPress logs for suspicious direct-route requests and unexpected admin sessions.
Exploit
Fix
LPE
Incorrect Privilege Assignment
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
CVE-2026-23550
Affected Products
Modular Ds
References · 48
- 🔥 https://patchstack.com/articles/critical-privilege-escalation-vulnerability-in-modular-ds-plugin-affecting-40k-sites-exploited-in-the-wild · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2026-23550 · Security Note
- https://help.modulards.com/en/article/modular-ds-security-release-modular-connector-252-dm3mv0 · Vendor Advisory
- https://twitter.com/ByteVanguardSec/status/2016375381452861714 · Twitter Post
- https://twitter.com/CyberLeveling/status/2012145354053911010 · Twitter Post
- https://twitter.com/ThreatSynop/status/2012241841127571514 · Twitter Post
- https://twitter.com/AndyChris_info/status/2015954399378420156 · Twitter Post
- https://twitter.com/HackingRabbitS/status/2013069117939458407 · Twitter Post
- https://twitter.com/ox0ffff/status/2012681386751050022 · Twitter Post
- https://twitter.com/DarkWebInformer/status/2011963974598770879 · Twitter Post
- https://twitter.com/pdnuclei_bot/status/2012102557079113796 · Twitter Post
- https://twitter.com/securityRSS/status/2012126323712409868 · Twitter Post
- https://twitter.com/cybernewslive/status/2012006426701676983 · Twitter Post
- https://twitter.com/vicariusltd/status/2014768435276771776 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1qdngky/critical_wordpress_modular_ds_plugin_flaw · Reddit Post