CVE-2026-23550: getLogin Bypass in Modular DS AuthController.php

Detail Information
CVE IDCVE-2026-23550
CVSS v3.1 Score10.0 (Critical)
Affected PluginModular DS (Modular Connector)
Vulnerable Versions≤ 2.5.1
Patched Version2.5.2 (Released January 14, 2026)
Disclosure DateJanuary 14, 2026 (Patchstack Advisory)
Active ExploitationSince January 13, 2026 (in the wild)
Attack VectorNetwork, Unauthenticated
Core FlawIncorrect privilege assignment in getLogin() – defaults to admin on missing user ID
Exposed Path/api/modular-connector/

A maximum-severity vulnerability in the popular Modular DS WordPress plugin (also known as Modular Connector) is under active exploitation, allowing attackers to gain full administrator access to affected sites without any authentication or user interaction. Tracked as CVE-2026-23550 with a CVSS score of 10.0, this unauthenticated privilege escalation flaw has exposed over 40,000 active installations to immediate compromise, including site defacement, ransomware deployment, data theft, and persistent backdoor creation.

The Vulnerability: Incorrect Privilege Assignment Leading to Admin Bypass

Discovered and disclosed by Patchstack researchers on January 14, 2026, CVE-2026-23550 stems from flawed handling in the plugin’s authentication and routing logic. In versions 2.5.1 and earlier, certain API routes under /api/modular-connector/ (intended for legitimate remote management) are exposed without proper protection.

The core issue lies in the getLogin method within src/app/Http/Controllers/AuthController.php. When processing a request:

  • The code attempts to extract a user ID from the request body.
  • If no specific user ID is provided (common in unauthenticated exploitation), the plugin falls back to selecting an existing administrator account.
  • It then automatically logs the attacker in as that admin — effectively bypassing all authentication checks.

This “direct request” mode, combined with insufficient cryptographic verification or route protection, turns an internal convenience feature into a catastrophic privilege escalation vector. Attackers can trigger the flaw remotely over the network with no prerequisites, making it trivial for automated scanners to probe and exploit vulnerable sites.

Exploitation began as early as January 13, 2026 (around 02:00 UTC), with confirmed attacks from IPs such as 45.11.89.19 and 185.196.0.11. Threat actors target the plugin’s login API to create new admin users or hijack existing ones, often as the first step in broader compromise campaigns.

Technical Breakdown and Exploitation Chain

Modular DS is designed for multi-site management: it enables remote monitoring, bulk updates, backups, user management, and even direct logins from a central dashboard. This makes it popular among agencies, freelancers, hosting providers, and enterprises managing dozens or hundreds of WordPress instances.

However, the exposed routes allow unauthenticated HTTP requests to reach sensitive endpoints. A typical exploit flow:

  1. Attacker scans for sites running Modular DS (e.g., via Google dorks like inurl:wp-content/plugins/modular-connector or Shodan/Masscan queries).
  2. Sends a crafted request to the vulnerable login route, omitting or manipulating the user ID parameter.
  3. Plugin processes the request, defaults to an admin user, and grants session cookies or tokens for full admin access.
  4. Once inside, attackers can install malicious plugins, modify themes, exfiltrate databases, deploy ransomware, or pivot to connected sites via the plugin’s multi-site features.

Public proof-of-concept (PoC) exploits have appeared on GitHub shortly after disclosure, fueling mass exploitation. While exact exploit code remains restricted in some reports to limit harm, automated tools are already probing and compromising unpatched sites.

Severity and Real-World Impact

  • CVSS v3.1 Score: 10.0 (Critical) — Attack Vector: Network, Complexity: Low, Privileges Required: None, User Interaction: None, Scope: Changed, Confidentiality/Integrity/Availability: High.
  • Affected Versions: Modular DS <= 2.5.1 (all prior versions).
  • Active Exploitation: Confirmed in the wild since January 13, 2026, with mass scanning and targeted takeovers.
  • Potential Consequences: Full site control enables credential harvesting, SEO spam, crypto-mining malware, data breaches (especially for e-commerce or membership sites), and supply-chain attacks if the compromised site manages others.

WordPress continues to power ~43% of the web in 2026, and plugins like Modular DS represent a high-value target due to their privileged access across multiple installations.

Mitigation and Recommendations

The vendor released Modular DS version 2.5.2 on January 14, 2026, which enforces proper authentication, removes fallback admin login behavior, and adds route protections.

Immediate actions for users:

  • Update to Modular DS 2.5.2 or later via the WordPress dashboard or automatic updates.
  • If auto-updates are disabled, manually upgrade as soon as possible.
  • Scan your site for signs of compromise (unexpected admin users, new plugins, modified .htaccess, suspicious traffic).
  • Apply WAF rules (Patchstack and others provide signatures to block exploitation attempts pre-patch).
  • Review connected sites: If using Modular DS for multi-site management, verify all linked installations.
  • Harden overall: Enable two-factor authentication (2FA), use strong passwords, limit plugin access, and monitor logs for anomalous API calls.

For organizations: Audit third-party plugins regularly, prioritize high-install-count tools, and consider alternatives with stronger security track records.

Conclusion

CVE-2026-23550 serves as a stark reminder of how seemingly minor routing or fallback logic flaws in widely adopted plugins can lead to devastating zero-interaction takeovers. In an era of automated botnets and rapid exploit dissemination, even trusted management tools become liabilities without vigilant patching.

The rapid disclosure-to-patch cycle here is commendable, but with exploitation already underway, thousands of sites remain at risk. If you’re running Modular DS, act now — attackers certainly are.

This vulnerability highlights how dangerous implicit trust in internal request paths can be when exposed to the public internet. Patchstack

Source and full details:

CISA STATUS 1505 ACTIVE EXPLOITS
● VIEW RECENT THREATS
Latest (10) KEVs
CVE-2021-39935 Added: Feb 03, 2026
GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
CVE-2025-64328 Added: Feb 03, 2026
Sangoma FreePBX OS Command Injection Vulnerability
CVE-2019-19006 Added: Feb 03, 2026
Sangoma FreePBX Improper Authentication Vulnerability
CVE-2025-40551 Added: Feb 03, 2026
SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
CVE-2026-1281 Added: Jan 29, 2026
Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
CVE-2026-24858 Added: Jan 27, 2026
Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability
CVE-2018-14634 Added: Jan 26, 2026
Linux Kernel Integer Overflow Vulnerability
CVE-2025-52691 Added: Jan 26, 2026
SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability
CVE-2026-23760 Added: Jan 26, 2026
SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
CVE-2026-24061 Added: Jan 26, 2026
GNU InetUtils Argument Injection Vulnerability
THREAT #1 CVE-2024-27198 94.58% SCORE
● VIEW DETAILED TOP 10
Global Intelligence
RANK #1 CVE-2024-27198 Score: 94.58% JetBrains TeamCity Authentication Bypass Vulnerability
RANK #2 CVE-2023-23752 Score: 94.52% Joomla! Improper Access Control Vulnerability
RANK #3 CVE-2017-1000353 Score: 94.51% Jenkins Remote Code Execution Vulnerability
RANK #4 CVE-2017-8917 Score: 94.50%
Known Security Vulnerability
RANK #5 CVE-2016-10033 Score: 94.49% PHPMailer Command Injection Vulnerability
RANK #6 CVE-2018-7600 Score: 94.49% Drupal Core Remote Code Execution Vulnerability
RANK #10 CVE-2018-13379 Score: 94.48% Fortinet FortiOS SSL VPN Path Traversal Vulnerability
GLOBAL THREAT GREEN Condition Level
VIEW THREAT REPORT
Threat Intelligence
Source: SANS ISC Report ↗ The InfoCon is a status system used by the SANS Internet Storm Center to track global internet threat levels.

CVE-2026-23550: getLogin Bypass in Modular DS AuthController.php

Detail Information
CVE IDCVE-2026-23550
CVSS v3.1 Score10.0 (Critical)
Affected PluginModular DS (Modular Connector)
Vulnerable Versions≤ 2.5.1
Patched Version2.5.2 (Released January 14, 2026)
Disclosure DateJanuary 14, 2026 (Patchstack Advisory)
Active ExploitationSince January 13, 2026 (in the wild)
Attack VectorNetwork, Unauthenticated
Core FlawIncorrect privilege assignment in getLogin() – defaults to admin on missing user ID
Exposed Path/api/modular-connector/

A maximum-severity vulnerability in the popular Modular DS WordPress plugin (also known as Modular Connector) is under active exploitation, allowing attackers to gain full administrator access to affected sites without any authentication or user interaction. Tracked as CVE-2026-23550 with a CVSS score of 10.0, this unauthenticated privilege escalation flaw has exposed over 40,000 active installations to immediate compromise, including site defacement, ransomware deployment, data theft, and persistent backdoor creation.

The Vulnerability: Incorrect Privilege Assignment Leading to Admin Bypass

Discovered and disclosed by Patchstack researchers on January 14, 2026, CVE-2026-23550 stems from flawed handling in the plugin’s authentication and routing logic. In versions 2.5.1 and earlier, certain API routes under /api/modular-connector/ (intended for legitimate remote management) are exposed without proper protection.

The core issue lies in the getLogin method within src/app/Http/Controllers/AuthController.php. When processing a request:

  • The code attempts to extract a user ID from the request body.
  • If no specific user ID is provided (common in unauthenticated exploitation), the plugin falls back to selecting an existing administrator account.
  • It then automatically logs the attacker in as that admin — effectively bypassing all authentication checks.

This “direct request” mode, combined with insufficient cryptographic verification or route protection, turns an internal convenience feature into a catastrophic privilege escalation vector. Attackers can trigger the flaw remotely over the network with no prerequisites, making it trivial for automated scanners to probe and exploit vulnerable sites.

Exploitation began as early as January 13, 2026 (around 02:00 UTC), with confirmed attacks from IPs such as 45.11.89.19 and 185.196.0.11. Threat actors target the plugin’s login API to create new admin users or hijack existing ones, often as the first step in broader compromise campaigns.

Technical Breakdown and Exploitation Chain

Modular DS is designed for multi-site management: it enables remote monitoring, bulk updates, backups, user management, and even direct logins from a central dashboard. This makes it popular among agencies, freelancers, hosting providers, and enterprises managing dozens or hundreds of WordPress instances.

However, the exposed routes allow unauthenticated HTTP requests to reach sensitive endpoints. A typical exploit flow:

  1. Attacker scans for sites running Modular DS (e.g., via Google dorks like inurl:wp-content/plugins/modular-connector or Shodan/Masscan queries).
  2. Sends a crafted request to the vulnerable login route, omitting or manipulating the user ID parameter.
  3. Plugin processes the request, defaults to an admin user, and grants session cookies or tokens for full admin access.
  4. Once inside, attackers can install malicious plugins, modify themes, exfiltrate databases, deploy ransomware, or pivot to connected sites via the plugin’s multi-site features.

Public proof-of-concept (PoC) exploits have appeared on GitHub shortly after disclosure, fueling mass exploitation. While exact exploit code remains restricted in some reports to limit harm, automated tools are already probing and compromising unpatched sites.

Severity and Real-World Impact

  • CVSS v3.1 Score: 10.0 (Critical) — Attack Vector: Network, Complexity: Low, Privileges Required: None, User Interaction: None, Scope: Changed, Confidentiality/Integrity/Availability: High.
  • Affected Versions: Modular DS <= 2.5.1 (all prior versions).
  • Active Exploitation: Confirmed in the wild since January 13, 2026, with mass scanning and targeted takeovers.
  • Potential Consequences: Full site control enables credential harvesting, SEO spam, crypto-mining malware, data breaches (especially for e-commerce or membership sites), and supply-chain attacks if the compromised site manages others.

WordPress continues to power ~43% of the web in 2026, and plugins like Modular DS represent a high-value target due to their privileged access across multiple installations.

Mitigation and Recommendations

The vendor released Modular DS version 2.5.2 on January 14, 2026, which enforces proper authentication, removes fallback admin login behavior, and adds route protections.

Immediate actions for users:

  • Update to Modular DS 2.5.2 or later via the WordPress dashboard or automatic updates.
  • If auto-updates are disabled, manually upgrade as soon as possible.
  • Scan your site for signs of compromise (unexpected admin users, new plugins, modified .htaccess, suspicious traffic).
  • Apply WAF rules (Patchstack and others provide signatures to block exploitation attempts pre-patch).
  • Review connected sites: If using Modular DS for multi-site management, verify all linked installations.
  • Harden overall: Enable two-factor authentication (2FA), use strong passwords, limit plugin access, and monitor logs for anomalous API calls.

For organizations: Audit third-party plugins regularly, prioritize high-install-count tools, and consider alternatives with stronger security track records.

Conclusion

CVE-2026-23550 serves as a stark reminder of how seemingly minor routing or fallback logic flaws in widely adopted plugins can lead to devastating zero-interaction takeovers. In an era of automated botnets and rapid exploit dissemination, even trusted management tools become liabilities without vigilant patching.

The rapid disclosure-to-patch cycle here is commendable, but with exploitation already underway, thousands of sites remain at risk. If you’re running Modular DS, act now — attackers certainly are.

This vulnerability highlights how dangerous implicit trust in internal request paths can be when exposed to the public internet. Patchstack

Source and full details:

Follow us on
© 2026 ByteVanguard • Independent Cyber Threat Intelligence