Analysis of OttoKit WordPress Plugin Vulnerability
Today, April 11, 2025, at 01:22 PM PDT, The Birdling 's 14th Command Team received intelligence that the vulnerability in the OttoKit WordPress plugin, previously known as SureTriggers, is still under active exploitation. OttoKit, with over 100,000 active installations, is an all-in-one automation platform enabling website administrators to connect applications, websites, and WordPress plugins, automating tasks without coding. The vulnerability, tracked as CVE-2025-3102, is an authentication bypass flaw that allows attackers to create new administrator accounts, potentially leading to complete website takeover. This article provides a detailed analysis of the vulnerability, its technical aspects, exploitation methods, and recommendations for mitigation, based on intelligence from reports.
WordPress powers approximately 43% of all websites globally, making it a prime target for cybercriminals. Plugins like OttoKit enhance functionality, with OttoKit specifically designed for workflow automation, connecting tools like WooCommerce, Mailchimp, and Google Sheets. With over 100,000 active installations, its popularity amplifies the impact of vulnerabilities.
CVE-2025-3102, disclosed on April 10, 2025, by Wordfence, has a CVSS score of 8.1, indicating high severity. It affects all versions of OttoKit up to and including 1.0.78, with the patch released in version 1.0.79 on April 3, 2025, following responsible disclosure on March 13, 2025.
The vulnerability is an authentication bypass due to a missing empty value check in the 'authenticate_user' function, which handles REST API authentication. Specifically, if the plugin is installed and activated but not configured with an API key, the 'secret_key' value remains empty. This allows attackers to send an empty 'st_authorization' header, bypassing authentication and accessing protected API endpoints, including those for user management.
The exploit process involves:
This flaw enables attackers to gain full control, potentially installing backdoors, defacing sites, or launching phishing campaigns.
Recommended by LinkedIn
Security firms like The Birdling, Patchstack and Defiant have confirmed active exploitation, with the first attempts logged just four hours after public disclosure. Attackers are using automated scripts to scan for vulnerable websites, creating new admin accounts with randomized credentials, a sign of task automation.
While specific threat actors have not been identified, the nature of the attacks suggests opportunistic cybercriminals targeting WordPress sites for easy gains. Given the plugin’s popularity, it could attract groups like the Balada Injector campaign, known for exploiting WordPress vulnerabilities to inject malicious code, though their focus is typically on SEO poisoning rather than admin creation.
To protect against CVE-2025-3102, WordPress administrators should: