Vulnerability Management, Threat Intelligence

Immediate exploitation of high-severity WordPress plugin flaw reported

Today’s columnist, Sebastian Gierlinger of Storyblok, offers nine tips for integrating a content management system with an ecommerce platform. (Credit: Getty Images Stock Photo)

Attacks leveraging a recently patched high-severity authentication bypass vulnerability in the widely used OttoKit plugin for WordPress, tracked as CVE-2025-3102, were found by Patchstack to have occurred just four hours following its public disclosure and inclusion in the WordPress security platform's database, according to BleepingComputer.

"This swift exploitation highlights the critical need to apply patches or mitigations immediately upon the public disclosure of such vulnerabilities," said Patchstack researchers, who urged users of the impacted plugin, formerly known as SureTriggers, to implement the latest OttoKit version 1.0.79. Vulnerable WordPress sites affected by the OttoKit security issue which arose from the absence of an empty value check within the authenticate_user() function could be exploited to allow the creation of unauthorized administrative accounts through randomized credential and email address combinations and eventual total hijacking of targeted websites, researchers added. Organizations have also been advised to monitor unwanted admin accounts, themes, and database access events, as well as altered security settings.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds