Tekmono
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
No Result
View All Result
Tekmono
No Result
View All Result
Home News
OttoKit Plugin Vulnerability Exploited Just Hours After Disclosure

OttoKit Plugin Vulnerability Exploited Just Hours After Disclosure

by Tekmono Editorial Team
11/04/2025
in News
Share on FacebookShare on Twitter

Hackers began exploiting a high-severity authentication bypass vulnerability in the OttoKit WordPress plugin just hours after its public disclosure, posing a significant risk to users.

The OttoKit WordPress plugin, formerly known as SureTriggers, allows users to connect various plugins and external tools like WooCommerce, Mailchimp, and Google Sheets to automate tasks without code. With the plugin active on 100,000 websites, the vulnerability identified as CVE-2025-3102 impacts all versions up to 1.0.78.

The flaw stems from a missing empty value check in the authenticate_user() function, which handles REST API authentication. If the plugin is not configured with an API key, the stored secret_key remains empty, allowing exploitation. An attacker can exploit this vulnerability by sending an empty st_authorization header, thereby bypassing authentication and gaining unauthorized access to protected API endpoints.

Related Reads

OpenAI Launches Customizable Skills for Codex Coding Agent

Amazon’s Alexa+ to Integrate with Four New Services

EA Investigated for AI-Generated Content in Battlefield 6

Apple to Start iPhone 18 Production in January

Essentially, CVE-2025-3102 enables attackers to create new administrator accounts without authentication, potentially leading to full site takeover. The vulnerability was reported to Wordfence by security researcher ‘mikemyers’ in mid-March, who received a $1,024 bounty for the discovery.

The plugin vendor was notified on April 3rd and released a fix in version 1.0.79 on the same day. However, exploitation attempts began just hours after the public disclosure of the vulnerability. Researchers at Patchstack reported that the first exploitation attempt was logged just four hours after the vulnerability was added to their database.

Attackers are attempting to create new administrator accounts with randomized username, password, and email address combinations, indicating automated attacks. Users of the OttoKit/SureTriggers plugin are strongly advised to upgrade to version 1.0.79 immediately and check logs for suspicious activity, such as new admin accounts, installation of plugins or themes, database access events, and modification of security settings.

ShareTweet

You Might Be Interested

OpenAI Launches Customizable Skills for Codex Coding Agent
News

OpenAI Launches Customizable Skills for Codex Coding Agent

24/12/2025
Amazon’s Alexa+ to Integrate with Four New Services
News

Amazon’s Alexa+ to Integrate with Four New Services

24/12/2025
EA Investigated for AI-Generated Content in Battlefield 6
News

EA Investigated for AI-Generated Content in Battlefield 6

24/12/2025
Apple to Start iPhone 18 Production in January
News

Apple to Start iPhone 18 Production in January

24/12/2025
Please login to join discussion

Recent Posts

  • OpenAI Launches Customizable Skills for Codex Coding Agent
  • Amazon’s Alexa+ to Integrate with Four New Services
  • EA Investigated for AI-Generated Content in Battlefield 6
  • Apple to Start iPhone 18 Production in January
  • Connect Your Phone to Wi-Fi Easily

Recent Comments

No comments to show.
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
Tekmono is a Linkmedya brand. © 2015.

No Result
View All Result
  • News
  • Guides
  • Lists
  • Reviews
  • Deals