Tech

WordPress plugin auth bypass exploited almost immediately after disclosure

Share
Share


  • A bug in OttoKit allows threat actors to create new admin accounts
  • The bug can lead to full website takeover
  • More than 100,000 websites are at risk

Almost immediately after being disclosed to the public, a vulnerability in a WordPress plugin was used in an attack, security researchers have warned.

Earlier this week, security outfit Wordfence disclosed an authentication bypass in OttoKit, the all-in-one workflow authentication platform. The vulnerability is tracked as CVE-2025-3102, and was given a severity score 8.1/10 (high).

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
Sigma just reinvented a classic lens loved by indie filmmakers like me – and it has one big improvement
Tech

Sigma just reinvented a classic lens loved by indie filmmakers like me – and it has one big improvement

Designed for APS-C (Super 35) mirrorless cameras Available for Sony E, Canon...

Nintendo has made Switch 2 scalping much harder in Japan by making a simple change to what’s in the box
Tech

Nintendo has made Switch 2 scalping much harder in Japan by making a simple change to what’s in the box

The Nintendo Switch 2 doesn’t include a warranty card to prevent scalpers...

Major police operation takes down notorious dark web marketplace Archetyp Market
Tech

Major police operation takes down notorious dark web marketplace Archetyp Market

Europol takes down Archetyp Market after five years of investigation One person...