Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      This week in AI dev tools: Slack’s enterprise search, Claude Code’s analytics dashboard, and more (July 18, 2025)

      July 18, 2025

      Report: 71% of tech leaders won’t hire devs without AI skills

      July 17, 2025

      Slack’s AI search now works across an organization’s entire knowledge base

      July 17, 2025

      In-House vs Outsourcing for React.js Development: Understand What Is Best for Your Enterprise

      July 17, 2025

      Microsoft kills Movies & TV storefront on Windows and Xbox — here’s what will happen to your purchased media

      July 18, 2025

      Wacom says its new drawing tablet needs no setup and has a pen that can’t die

      July 18, 2025

      NordPass vs. Bitwarden: Which password manager is best?

      July 18, 2025

      Elon Musk teasing a Grok male companion inspired by “50 Shades of Grey” — beating Microsoft’s AI CEO at his own game

      July 18, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 18, 2025
      Recent

      The details of TC39’s last meeting

      July 18, 2025

      Conditional Collection Skipping with Laravel’s skipWhile Method

      July 18, 2025

      Deploying Laravel Applications on Laravel Cloud With MongoDB Atlas

      July 18, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Ubuntu 25.10 Shrinks its Raspberry Pi Install Footprint

      July 18, 2025
      Recent

      Ubuntu 25.10 Shrinks its Raspberry Pi Install Footprint

      July 18, 2025

      Microsoft kills Movies & TV storefront on Windows and Xbox — here’s what will happen to your purchased media

      July 18, 2025

      Unplugged and Unstoppable: How Linux Transforms Laptop Power Management

      July 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»100,000+ WordPress Sites at Risk as SureTriggers Exploit Goes Live

    100,000+ WordPress Sites at Risk as SureTriggers Exploit Goes Live

    April 11, 2025
    100,000+ WordPress Sites at Risk as SureTriggers Exploit Goes Live

    SureTriggers Vulnerability

    A recently uncovered SureTriggers vulnerability has put more than 100,000 websites at risk, highlighting once again how critical plugin security is for WordPress site administrators. The vulnerability, officially identified as CVE-2025-3102, has a CVSS score of 8.1, placing it in the high-severity category. This flaw allows unauthorized users to create administrator accounts under specific conditions, potentially giving attackers full control over affected websites.

    SureTriggers—an automation platform designed to link various web apps, services, and WordPress plugins—was recently rebranded from OttoKit. While it’s widely used for streamlining online workflows, this WordPress plugin vulnerability has become a major point of concern in the cybersecurity community.

    SureTriggers Vulnerability: Under Active Exploitation Hours After Disclosure 

    According to Wordfence Intelligence, the flaw began seeing active exploitation just hours after it was publicly disclosed. The vulnerability is an authorization bypass due to a missing empty value check in the plugin’s authenticate_user() function. This oversight can be exploited by an attacker if the plugin is installed and activated but not configured with an API key—something that’s unfortunately common with newly deployed plugins. 

    Security researcher mikemyers was credited with discovering the issue, which earned a bug bounty of $1,024. The vulnerability affects all versions of SureTriggers up to version 1.0.78. Users are strongly advised to update to the fully patched version, 1.0.79, to protect their sites. 

    A Closer Look at the Vulnerability in SureTriggers 

    The root cause of the issue lies in the plugin’s use of the autheticate_user() function within the RestController class. This function is meant to validate API requests using a secret key found in the request header. However, the implementation fails to check for empty values. If a website hasn’t been configured with an API key, this check will return true even when the attacker provides a blank secret key, giving them access to the REST API endpoints.

    This critical oversight means that attackers can bypass authentication entirely and trigger automated actions—one of which includes creating a new administrator user. As a result, vulnerabilities in WordPress plugins like this one can lead to total site takeover.

    Full Site Compromise a Real Threat 

    Once administrative access is gained, attackers have free rein over the site. This includes uploading malicious themes or plugins, injecting spam or malware into posts and pages, or redirecting users to external malicious sites. The ramifications are far-reaching, from SEO damage to compromised customer data. 

    The vulnerability in SureTriggers is especially concerning because it doesn’t require the attacker to already be logged in or have any kind of prior access. The only requirement is that the site is running a vulnerable, unconfigured version of the plugin. This type of SureTriggers vulnerability is a textbook example of why secure default configurations are vital for plugin developers. 

    Conclusion  

    The SureTriggers vulnerability highlights the importance of proactive site security and timely updates in the WordPress ecosystem. Security experts, including those at Wordfence, strongly recommend that all users update to version 1.0.79 or later—even if the plugin is inactive but still installed—as unpatched versions remain exploitable. Administrators should also check for unauthorized admin accounts and thoroughly audit plugin settings. Compounding the risk, this flaw could be chained with other vulnerabilities, such as arbitrary plugin installation, making even dormant installations a potential entry point.  

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleSpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps
    Next Article Thailand and Malaysia Ramp Up Financial Cybersecurity Amid Escalating Threats

    Related Posts

    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    July 18, 2025
    Defending against Prompt Injection with Structured Queries (StruQ) and Preference Optimization (SecAlign)
    Artificial Intelligence

    Defending against Prompt Injection with Structured Queries (StruQ) and Preference Optimization (SecAlign)

    July 18, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    High-Entropy Token Selection in Reinforcement Learning with Verifiable Rewards (RLVR) Improves Accuracy and Reduces Training Cost for LLMs

    Machine Learning

    Critical RCE Vulnerability in Erlang/OTP SSH Server Impacts Multiple Cisco Products

    Security

    CVE-2025-4275 – Insyde BIOS UEFI Bootloader Execution

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-27689 – Dell iDRAC Tools Privilege Escalation

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2024-57273 – Netgate pfSense CE Cross-Site Scripting Vulnerability

    May 14, 2025

    CVE ID : CVE-2024-57273

    Published : May 14, 2025, 2:15 p.m. | 51 minutes ago

    Description : Netgate pfSense CE (prior to 2.8.0 beta release) and corresponding Plus builds is vulnerable to Cross-site scripting (XSS) in the Automatic Configuration Backup (ACB) service, allowing remote attackers to execute arbitrary JavaScript, delete backups, or leak sensitive information via an unsanitized “reason” field and a derivable device key generated from the public SSH key.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-6280 – TransformerOptimus SuperAGI EmailToolKit Path Traversal Vulnerability

    June 19, 2025

    This mirror wraps your reflection inside Microsoft Paint — but you only have two days to order your own

    April 17, 2025

    CVE-2024-40458 – Ocuco Innovation Elevation of Privilege

    May 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.