Categories: Cyber Security News

Critical WordPress Plugin Flaw Enables Authentication Bypass Attacks

A critical authentication bypass vulnerability has been discovered in Burst Statistics, a popular WordPress analytics plugin with over 200,000 active installations, putting hundreds of thousands of websites at risk of full administrator takeover with no valid credentials required.

Discovered on May 8, 2026, by PRISM Wordfence Threat Intelligence’s autonomous AI-powered research platform, the flaw carries a near-perfect CVSS score of 9.8 (Critical) and is tracked as CVE-2026-8181.

The vulnerability affects plugin versions 3.4.0 through 3.4.1.1 and was patched in version 3.4.2, released on May 12, 2026, just one day after the vendor acknowledged the report.

WordPress Plugin Flaw

The vulnerability stems from a flawed return-value check inside the is_mainwp_authenticated() function in includes/Frontend/class-mainwp-proxy.php.

The plugin’s MainWP integration reads attacker-supplied credentials from the Authorization HTTP headers and passes them to WordPress core’s wp_authenticate_application_password() function, but critically, it only checks whether the result is a WP_Error, not whether it’s a valid WP_User object:

php$is_valid = wp_authenticate_application_password( null, $username, $password );
if ( is_wp_error( $is_valid ) ) {
    return false;
}
wp_set_current_user( $user->ID );
return true;

When Application Passwords are not in use, WordPress core returns null instead of a WP_Error on failure.

Because null is not a WP_ErrorThe authentication guard silently passes, and the attacker-supplied admin username is set as the globally authenticated user for the entire REST API request. The fix requires checking $is_valid instanceof WP_User before proceeding.

An attacker who knows a single valid administrator username can exploit this with one HTTP request:

textPOST /wp-json/wp/v2/users HTTP/1.1
Host: target-site.com
X-BurstMainWP: 1
Authorization: Basic <base64(admin:anyfakepassword)>

This request would create a new administrator-level account with zero real credentials.

Affected Versions & Immediate Actions

Key details security teams and site administrators need to know:

  • Affected versions: Burst Statistics 3.4.0 – 3.4.1.1
  • Patched version: 3.4.2 (released May 12, 2026)
  • CVE ID: CVE-2026-8181 | CVSS 9.8 Critical
  • Wordfence Premium/Care/Response users received firewall protection on May 8, 2026
  • Wordfence Free users will receive firewall protection on June 7, 2026
  • Exploitation risk: High, unauthenticated attackers only need a valid admin username

Site owners running Burst Statistics should update to version 3.4.2 immediately. Given the unauthenticated nature of this flaw and the ease of exploitation, Wordfence explicitly warned that active exploitation attempts are expected.

The vulnerability was introduced in the codebase on April 23, 2026, discovered 15 days later, and patched within 19 days, a timeline Wordfence cited as a demonstration of AI-accelerated vulnerability research reducing attacker opportunity windows.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google

The post Critical WordPress Plugin Flaw Enables Authentication Bypass Attacks appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Nintendo Exclusives Are Dominating Amazon’s Best-Selling Video Games List

One of the biggest debates surrounding the Switch 2 has been whether the console has…

1 hour ago

Today’s Top Deals: Clair Obscur: Expedition 33, Xbox Gift Card, and Sonic Racing: CrossWorlds for Switch 2

A bunch of popular PC titles are discounted today, including our top game of 2025,…

1 hour ago

Subnautica 2 Lures In Nearly Half a Million Concurrent Players on Steam Within First Hour of Release

Subnautica 2 has hit almost half a million concurrent players on Steam in its first…

1 hour ago

TeamPCP and BreachForums Launch $1,000 Contest for Supply Chain Attacks

A cybercrime operation is turning software supply chain attacks into a public competition. TeamPCP, in…

1 hour ago

Critical Windows DNS Client Flaw Enables Remote Code Execution

A silent killer is lurking inside millions of Windows machines. A newly disclosed vulnerability in…

1 hour ago

New Exim Vulnerability Enables Arbitrary Code Execution Attacks

A newly disclosed vulnerability in the widely deployed Exim mail transfer agent (MTA) is putting…

1 hour ago

This website uses cookies.