
| Detail | Information |
|---|---|
| CVE ID | CVE-2026-23550 |
| CVSS v3.1 Score | 10.0 (Critical) |
| Affected Plugin | Modular DS (Modular Connector) |
| Vulnerable Versions | ≤ 2.5.1 |
| Patched Version | 2.5.2 (Released January 14, 2026) |
| Disclosure Date | January 14, 2026 (Patchstack Advisory) |
| Active Exploitation | Since January 13, 2026 (in the wild) |
| Attack Vector | Network, Unauthenticated |
| Core Flaw | Incorrect privilege assignment in getLogin() – defaults to admin on missing user ID |
| Exposed Path | /api/modular-connector/ |
A maximum-severity vulnerability in the popular Modular DS WordPress plugin (also known as Modular Connector) is under active exploitation, allowing attackers to gain full administrator access to affected sites without any authentication or user interaction. Tracked as CVE-2026-23550 with a CVSS score of 10.0, this unauthenticated privilege escalation flaw has exposed over 40,000 active installations to immediate compromise, including site defacement, ransomware deployment, data theft, and persistent backdoor creation.
Discovered and disclosed by Patchstack researchers on January 14, 2026, CVE-2026-23550 stems from flawed handling in the plugin’s authentication and routing logic. In versions 2.5.1 and earlier, certain API routes under /api/modular-connector/ (intended for legitimate remote management) are exposed without proper protection.
The core issue lies in the getLogin method within src/app/Http/Controllers/AuthController.php. When processing a request:
This “direct request” mode, combined with insufficient cryptographic verification or route protection, turns an internal convenience feature into a catastrophic privilege escalation vector. Attackers can trigger the flaw remotely over the network with no prerequisites, making it trivial for automated scanners to probe and exploit vulnerable sites.
Exploitation began as early as January 13, 2026 (around 02:00 UTC), with confirmed attacks from IPs such as 45.11.89.19 and 185.196.0.11. Threat actors target the plugin’s login API to create new admin users or hijack existing ones, often as the first step in broader compromise campaigns.
Modular DS is designed for multi-site management: it enables remote monitoring, bulk updates, backups, user management, and even direct logins from a central dashboard. This makes it popular among agencies, freelancers, hosting providers, and enterprises managing dozens or hundreds of WordPress instances.
However, the exposed routes allow unauthenticated HTTP requests to reach sensitive endpoints. A typical exploit flow:
Public proof-of-concept (PoC) exploits have appeared on GitHub shortly after disclosure, fueling mass exploitation. While exact exploit code remains restricted in some reports to limit harm, automated tools are already probing and compromising unpatched sites.
WordPress continues to power ~43% of the web in 2026, and plugins like Modular DS represent a high-value target due to their privileged access across multiple installations.
The vendor released Modular DS version 2.5.2 on January 14, 2026, which enforces proper authentication, removes fallback admin login behavior, and adds route protections.
Immediate actions for users:
For organizations: Audit third-party plugins regularly, prioritize high-install-count tools, and consider alternatives with stronger security track records.
CVE-2026-23550 serves as a stark reminder of how seemingly minor routing or fallback logic flaws in widely adopted plugins can lead to devastating zero-interaction takeovers. In an era of automated botnets and rapid exploit dissemination, even trusted management tools become liabilities without vigilant patching.
The rapid disclosure-to-patch cycle here is commendable, but with exploitation already underway, thousands of sites remain at risk. If you’re running Modular DS, act now — attackers certainly are.
This vulnerability highlights how dangerous implicit trust in internal request paths can be when exposed to the public internet. Patchstack
Source and full details:

| Detail | Information |
|---|---|
| CVE ID | CVE-2026-23550 |
| CVSS v3.1 Score | 10.0 (Critical) |
| Affected Plugin | Modular DS (Modular Connector) |
| Vulnerable Versions | ≤ 2.5.1 |
| Patched Version | 2.5.2 (Released January 14, 2026) |
| Disclosure Date | January 14, 2026 (Patchstack Advisory) |
| Active Exploitation | Since January 13, 2026 (in the wild) |
| Attack Vector | Network, Unauthenticated |
| Core Flaw | Incorrect privilege assignment in getLogin() – defaults to admin on missing user ID |
| Exposed Path | /api/modular-connector/ |
A maximum-severity vulnerability in the popular Modular DS WordPress plugin (also known as Modular Connector) is under active exploitation, allowing attackers to gain full administrator access to affected sites without any authentication or user interaction. Tracked as CVE-2026-23550 with a CVSS score of 10.0, this unauthenticated privilege escalation flaw has exposed over 40,000 active installations to immediate compromise, including site defacement, ransomware deployment, data theft, and persistent backdoor creation.
Discovered and disclosed by Patchstack researchers on January 14, 2026, CVE-2026-23550 stems from flawed handling in the plugin’s authentication and routing logic. In versions 2.5.1 and earlier, certain API routes under /api/modular-connector/ (intended for legitimate remote management) are exposed without proper protection.
The core issue lies in the getLogin method within src/app/Http/Controllers/AuthController.php. When processing a request:
This “direct request” mode, combined with insufficient cryptographic verification or route protection, turns an internal convenience feature into a catastrophic privilege escalation vector. Attackers can trigger the flaw remotely over the network with no prerequisites, making it trivial for automated scanners to probe and exploit vulnerable sites.
Exploitation began as early as January 13, 2026 (around 02:00 UTC), with confirmed attacks from IPs such as 45.11.89.19 and 185.196.0.11. Threat actors target the plugin’s login API to create new admin users or hijack existing ones, often as the first step in broader compromise campaigns.
Modular DS is designed for multi-site management: it enables remote monitoring, bulk updates, backups, user management, and even direct logins from a central dashboard. This makes it popular among agencies, freelancers, hosting providers, and enterprises managing dozens or hundreds of WordPress instances.
However, the exposed routes allow unauthenticated HTTP requests to reach sensitive endpoints. A typical exploit flow:
Public proof-of-concept (PoC) exploits have appeared on GitHub shortly after disclosure, fueling mass exploitation. While exact exploit code remains restricted in some reports to limit harm, automated tools are already probing and compromising unpatched sites.
WordPress continues to power ~43% of the web in 2026, and plugins like Modular DS represent a high-value target due to their privileged access across multiple installations.
The vendor released Modular DS version 2.5.2 on January 14, 2026, which enforces proper authentication, removes fallback admin login behavior, and adds route protections.
Immediate actions for users:
For organizations: Audit third-party plugins regularly, prioritize high-install-count tools, and consider alternatives with stronger security track records.
CVE-2026-23550 serves as a stark reminder of how seemingly minor routing or fallback logic flaws in widely adopted plugins can lead to devastating zero-interaction takeovers. In an era of automated botnets and rapid exploit dissemination, even trusted management tools become liabilities without vigilant patching.
The rapid disclosure-to-patch cycle here is commendable, but with exploitation already underway, thousands of sites remain at risk. If you’re running Modular DS, act now — attackers certainly are.
This vulnerability highlights how dangerous implicit trust in internal request paths can be when exposed to the public internet. Patchstack
Source and full details: