Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Second OttoKit Vulnerability Exploited to Hack WordPress Sites

Threat actors are targeting a critical-severity vulnerability in the OttoKit WordPress plugin to gain administrative privileges.

WordPress vulnerability

The exploitation of a second vulnerability in the OttoKit WordPress plugin has come to light, less than a month after threat actors were seen targeting a different bug to take over websites, WordPress security firm Defiant warns.

A plugin with more than 100,000 installations, OttoKit: All-in-One Automation Platform (formerly SureTriggers) provides site administrators with task automation options, allowing them to connect apps, websites, and other plugins.

In early April, attackers were seen exploiting CVE-2025-3102, a missing check issue impacting new and unconfigured OttoKit installations, to create new administrative accounts and take over vulnerable websites.

Now, Defiant warns of attacks targeting a fresh bug in the plugin, CVE-2025-27007 (CVSS score of 9.8), that could allow unauthenticated attackers to connect to impacted sites.

The security defect resides in the plugin’s ‘create_wp_connection()’ function, which fails to properly verify a user’s authentication, allowing attackers to elevate their privileges.

However, the successful exploitation of the vulnerability requires that the “site has never enabled or used an application password, and OttoKit/SureTriggers has never been connected to the website using an application password before,” Defiant explains.

“In this case, an attacker should be able to successfully exploit this vulnerability without any knowledge of a valid username,” the security firm notes.

Because a successful connection in some cases requires an application password, sites that have already connected to the plugin with an application password should not allow unauthenticated connections.

Advertisement. Scroll to continue reading.

Defiant notes that an authenticated attacker who can generate an application password can exploit the bug at will. However, such level of access would likely open for the attacker other paths to exploit the compromised site.

“Currently, it appears that attackers are attempting to exploit the initial connection vulnerability to establish a connection with the site, and then subsequently use that to create an administrative user account through the automation/action endpoint,” Defiant notes.

The security firm has shared indicators of compromise (IoCs) to help site administrators hunt for signs of exploitation. It also warns that it continues to see attempts to exploit the previous OttoKit bug, CVE-2025-3102.

OttoKit version 1.0.83 contains patches for both vulnerabilities. Site owners and administrators are advised to update their installations as soon as possible.

Related: Threat Actors Deploy WordPress Malware in ‘mu-plugins’ Directory

Related: 8,000 New WordPress Vulnerabilities Reported in 2024

Related: Hunk Companion, WP Query Console Vulnerabilities Chained to Hack WordPress Sites

Related: Critical Vulnerabilities Found in Anti-Spam Plugin Used by 200,000 WordPress Sites

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Cloud and cybersecurity MSP Ekco has appointed Ben Savage as UK CEO.

Shane Barney has been appointed CISO of password management and PAM solutions provider Keeper Security.

Edge Delta has appointed Joan Pepin as its Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.