Agencias

Critical alert: admin access without credentials in Modular DS (CVE-2026-23550)

Critical alert: admin access without credentials in Modular DS (CVE-2026-23550)

Summary

⚠ Critical · CVSS 10.0 · Active exploitation confirmed What is happening On February 9, 2026, VenCERT published an advisory about a…

⚠ Critical · CVSS 10.0 · Active exploitation confirmed

What is happening

On February 9, 2026, VenCERT published an advisory about a critical vulnerability in the Modular DS / Modular Connector plugin for WordPress (CVE-2026-23550), scoring CVSS 10.0, which allows an attacker to gain administrator access without any credentials.

This is not theoretical: active exploitation in the wild has been confirmed.

The technical vector (no fluff)

The plugin exposes routes under the prefix:

/api/modular-connector/

There is a way to trigger a “direct request” mode simply by appending parameters such as:

This causes the plugin to treat the request as if it came from the legitimate platform, bypassing the authentication middleware. Subsequently, routes like /login/ can trigger auto-login as admin on already connected sites (with tokens present or renewable).

Key dates

EventDate
First exploitation detectionsJanuary 13, 2026 (~02:00 UTC)
CVE published / initial advisoriesJanuary 14, 2026
Initial patch (2.5.2)January 2026
Required update (2.6.0)After additional research

Affected versions

All versions up to and including 2.5.1.

Real-world impact if exploited

Indicators of Compromise (IoC) to review

Patchstack reported source IPs observed in attacks. If you manage multiple sites, cross-reference your logs against those IPs.

What to do right now (step by step)

  1. Update the plugin now
    Minimum: 2.5.2 · Vendor recommended: 2.6.0 (REQUIRED)
  2. Regenerate WordPress salts
    Invalidates all active sessions and cuts off stolen sessions.
  3. Regenerate OAuth credentials and reconnect sites (if applicable)
  4. Audit administrators
    Remove suspicious accounts and review recent role/user changes.
  5. Scan files and plugins for malware
    Tools like Imunify can detect malicious additions.
  6. (Extra defensive) Restrict the endpoint
    If you operate many sites, consider restricting access to /api/modular-connector/ by IP, VPN or WAF while you finish your review.

Why this matters if you manage multiple sites

There was active exploitation. The attack vector was an authentication bypass on connector routes. If you manage multiple WordPress sites with Modular DS, this is exactly the kind of incident that ruins your week if you lack operational visibility.

With Vulnity you can detect signals like:

And generate a timeline and report to show your client what was prevented and what was done. No posturing — just data.

About Vulnity

Keeping WordPress secure requires constant vigilance. Vulnity does that work for you: detecting anomalies, alerting on suspicious changes, and logging everything.