Categories: Cyber Security News

Critical WordPress Plugin Vulnerability Exposes Websites to Authentication Bypass Attacks

A critical vulnerability in a widely used WordPress plugin has exposed over 200,000 websites to full account takeover, raising urgent concerns across the security community.

Discovered on May 8, 2026, by Wordfence’s AI-powered PRISM threat intelligence platform, the flaw affects the Burst Statistics plugin, a privacy-focused analytics tool.

Tracked as CVE-2026-8181 with a CVSS score of 9.8, the vulnerability enables unauthenticated attackers to bypass authentication and impersonate administrator accounts.

The issue impacts versions 3.4.0 through 3.4.1.1 and was introduced on April 23, 2026.

Notably, it was identified within just 15 days and patched 19 days later, highlighting how AI-driven vulnerability discovery is shrinking the exploitation window.

WordPress Plugin Auth Bypass Flaw

The vulnerability stems from improper validation in the plugin’s MainWP integration, specifically within the is_mainwp_authenticated() function.

This function processes authentication requests via the HTTP Authorization header but fails to verify the credentials’ validity.

Due to insecure return-value handling, the plugin treats any non-error response from WordPress’s wp_authenticate_application_password() function as successful authentication.

In certain cases, this function returns null instead of an error when authentication fails, allowing malicious requests to pass through unchecked.

An attacker can exploit this flaw by sending a crafted REST API request with a valid administrator username and any arbitrary password encoded in a Basic Authentication header.

The plugin then sets the current user context to the targeted administrator, effectively granting full privileges for the duration of the request.

Successful exploitation allows attackers to perform high-privilege actions without prior authentication.

For example, a single request to the /wp-json/wp/v2/users endpoint could create a new administrator account, enabling persistent access and complete site compromise.

Because the vulnerability affects all REST API endpoints, attackers can abuse core WordPress functionality beyond the plugin itself, significantly increasing the attack surface.

Patch and Mitigation

The Burst Statistics team responded rapidly after disclosure. Wordfence initiated responsible disclosure on May 8, shared full details on May 11, and the vendor released a patched version (3.4.2) on May 12, 2026.

Users are strongly advised to update immediately to version 3.4.2 or later to mitigate the risk.

Wordfence customers using Premium, Care, or Response tiers received firewall protection on May 8, while free users are scheduled to receive the same protection on June 7, 2026.

    Security experts warn that the simplicity of exploitation and lack of authentication make this vulnerability highly attractive to threat actors.

    Administrators should audit user accounts, monitor logs, and ensure immediate patching to prevent compromise.

    Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Critical WordPress Plugin Vulnerability Exposes Websites to Authentication Bypass Attacks appeared first on Cyber Security News.

    rssfeeds-admin

    Recent Posts

    Iron Lung Will Be Available to Watch on YouTube This Month

    Iron Lung, the debut feature film from successful YouTuber Mark Fischbach, will be available to…

    42 minutes ago

    Tycoon 2FA Adopts OAuth Device Code Attacks In MFA Bypass Campaign

    Threat actors rarely stay down for long. Just weeks after a massive global takedown in…

    53 minutes ago

    Tycoon 2FA Adopts OAuth Device Code Attacks In MFA Bypass Campaign

    Threat actors rarely stay down for long. Just weeks after a massive global takedown in…

    53 minutes ago

    Tycoon 2FA Adopts OAuth Device Code Attacks In MFA Bypass Campaign

    Threat actors rarely stay down for long. Just weeks after a massive global takedown in…

    53 minutes ago

    Claude Code RCE Vulnerability Allow Attackers Execute Commands via Malicious Deeplinks

    A severe remote code execution (RCE) vulnerability has been discovered in Anthropic’s Claude Code, the…

    54 minutes ago

    Michigan expands push to get young men into college and skilled trades

    INDIANAPOLIS, IND. (WOWO) Michigan officials are expanding statewide efforts to encourage more young men to…

    1 hour ago

    This website uses cookies.