A vulnerability was found on Wordpress' Modular DS plug-in.
A vulnerability was found on Wordpress' Modular DS plug-in, conducive to hackers seizing the site.
WordPress may be a tool for building websites that are popular with a lot of support tools, but at the same time, it also has a lot of security weaknesses.
According to a report by The Hacker News website, a vulnerability has been detected on Wordpress's plug-in called Modular DS, a plug-in that helps manage things on Wordpress to make it easier. This plug-in has more than 40 thousand downloads at the present time, so it is considered a fairly popular plug-in. For such a vulnerability, it is coded CVE-2026-23550 with the highest level of seriousness because it has received a CVSS rating, which measures the seriousness of a security vulnerability of up to 10.0. This vulnerability opens a channel for the aggressor. The right to access the system can be upgraded without the permission of the real administrator. This vulnerability covers users of the plug-in in all versions, including version 2.5.1.
This vulnerability occurs in a routing mechanism or Routing Mechanics that normally provides a vulnerable route in a framework that requires authentication every time under the prefix "/ api / modular-connector," but the problem is that this layer of security can be evaded when the mode of direct request traffic or "Direct Request" is enabled by setting the "Origin" parameter to "Mo" and the "Type" parameter to any value, such as "origin = mo & type = xxx." Setting a parameter like this makes the routing mechanism understand that the request came directly from the Modular DS plugin.
This allows hackers who access websites that use Modular DS to access sensitive routes such as / login /, / server-information /, / manager /, and / backup /. This will result in hackers being able to easily steal data or use stolen data to gain control of websites. This vulnerability has been detected in the past 13 January, with the victim site receiving an HTTP GET request from the IP number 45.11.89 [.] 19 and 185.196.0. [.] 11 Endpoints "/ api / modular-connector / login /" followed by an attempt to create an Admin account (Admin or Administrator) clearly illustrates the danger of this security vulnerability.
The source has warned those who use the plug-in to update the plug-in to the latest version immediately and check if there is a foreign account or administrator on the system. If it is detected, follow these steps.
Instead, create WordPress Salts, which will help to automatically undo various Session applications immediately.
Create a new OAuth code.
Scan the website for unusual files, plug-ins, or codes.
# Trending # Lemon 8 Howtoo # lemon 8 diary # Wordpress # freedomhack






























































