
Hackers are leveraging a important authentication bypass vulnerability within the WordPress plugin Burst Statistics to acquire admin-level get admission to to internet sites.
Burst Statistics is a privacy-focused analytics plugin energetic on 200,000 WordPress websites and advertised as a light-weight choice to Google Analytics.
The flaw, tracked as CVE-2026-8181, was once offered on April 23 with the discharge of model 3.4.0 of the plugin. The prone code was once additionally provide within the following iteration, model 3.4.1.
Consistent with Wordfence, which came upon CVE-2026-8181 on Would possibly 8, the flaw permits unauthenticated attackers to impersonate recognized admin customers all through REST API requests, or even create rogue admin accounts.
“This vulnerability permits unauthenticated attackers who know a legitimate administrator username to completely impersonate that administrator at some point of any REST API request, together with WordPress core endpoints comparable to /wp-json/wp/v2/customers, by means of supplying any arbitrary and unsuitable password in a Elementary Authentication header,” explains Wordfence.
“In a worst-case state of affairs, an attacker may just exploit this flaw to create a brand new administrator-level account and not using a prior authentication in any way.”
The foundation purpose is the unsuitable interpretation of the ‘wp_authenticate_application_password()’ serve as effects, in particular, treating a ‘WP_Error’ as a sign of a success authentication.
On the other hand, the researchers give an explanation for that WordPress too can go back ‘null’ in some circumstances, which is mistakenly handled as an authenticated request.
Because of this, the code calls ‘wp_set_current_user()’ with the attacker-supplied username, successfully impersonating that consumer at some point of the REST API request.
Admin usernames could also be uncovered in weblog posts, feedback, and even in public API requests, however attackers too can use brute-force ways to wager them.
Admin-level get admission to permits attackers to get admission to personal databases, plant backdoors, redirect guests to unsafe places, distribute malware, create rogue admin customers, and extra.
Whilst Wordfence warned in its put up that they “be expecting this vulnerability to be focused by means of attackers and, as such, updating to the newest model once imaginable is important,” its tracker presentations that malicious task has already begun.
Consistent with the similar platform, the site safety company has blocked over 7,400 assaults focused on CVE-2026-8181 prior to now 24 hours, so the task is important.
Customers of the Burst Statistics plugin are beneficial to improve to the patched free up, model 3.4.2, launched on Would possibly 12, 2026, or disable the plugin on their web page.
WordPress.org stats display that Burst Statistics had 85,000 downloads for the reason that free up of three.4.2, so assuming that every one have been for the newest model, there stay more or less 115,000 websites uncovered to admin takeover assaults.

AI chained 4 zero-days into one exploit that bypassed each renderer and OS sandboxes. A wave of latest exploits is coming.
On the Self reliant Validation Summit (Would possibly 12 & 14), see how self reliant, context-rich validation unearths what is exploitable, proves controls cling, and closes the remediation loop.
Declare Your Spot



