Cyber Security News

Rogue Account‑Creation Flaw Leaves 100 K WordPress Sites Exposed

A severe vulnerability has been uncovered in the SureTriggers WordPress plugin, which could leave over 100,000 websites at risk.

The issue, discovered by security researcher mikemyers, allows attackers to create rogue administrative users on sites where the plugin is not properly configured.

Vulnerability Details

This critical flaw, registered as CVE-2025-3102, is rooted in the plugin’s autheticate_user function within the RestController class.

The function checks if the secret_key submitted in the HTTP header matches the one stored within the plugin settings.

However, the function fails to check if the secret_key is empty, meaning that if no API key has been set, the function will return true regardless, effectively bypassing authentication.

The affected endpoint /wp-json/suretriggers/automation/action becomes a gateway for attackers to execute arbitrary actions, including creating new administrative users, if the site owner has not set an API key in the plugin’s configuration.

This vulnerability was only present in unconfigured or newly installed versions of SureTriggers, up to and including version 1.0.78.

Technical Insight

The SureTriggers plugin aims to streamline the automation of tasks across different web platforms and applications.

It includes a REST API endpoint designed for integrating with external services.

The endpoint’s security relies on the permission_callback hook which calls the autheticate_user function. Here’s the problematic function:

public function autheticate_user( $request ) {
    $secret_key       = $request->get_header( 'st_authorization' );
    list($secret_key) = sscanf( $secret_key, 'Bearer %s' );

    if ( $this->secret_key !== $secret_key ) {
        return false;
    }

    return true;
}

This function checks the secret_key from the request against the internal key.

However, if the plugin hasn’t been configured with an API key, this->secret_key will be empty, allowing the condition to pass regardless of what is sent by the attacker.

The discovery was promptly reported to the Wordfence Bug Bounty Program on March 13, 2025, leading to a coordinated response:

  • April 1, 2025: Wordfence Premium, Care, and Response users were protected by a firewall rule against potential exploits of this vulnerability.
  • April 3, 2025: The vulnerability details were forwarded to the SureTriggers plugin developer, Brainstorm Force, who acknowledged the issue and worked on a fix.
  • April 3, 2025: The patched version, 1.0.79, was released to address the vulnerability.
  • May 1, 2025: Wordfence free users received the same firewall protection.

WordPress site owners who use SureTriggers should update their plugin to version 1.0.79 as soon as possible to mitigate this risk.

This incident highlights the importance of proper configuration of security features in plugins and the ongoing battle to secure the WordPress ecosystem against potential threats.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

7 Best Third-Party Risk Management Software in 2025

Whether you operate a small business or run a large enterprise, you rely on third-party…

3 hours ago

Chrome UAF Process Vulnerabilities Actively Exploited

Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser process…

5 hours ago

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to Publish

An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive documents…

7 hours ago

‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security

Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users: a…

7 hours ago

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access

A sophisticated cyberattack campaign has surfaced, targeting poorly managed Microsoft SQL (MS-SQL) servers to deploy…

8 hours ago

New Report Reveals How AI is Rapidly Enhancing Phishing Attack Precision

The Zscaler ThreatLabz 2025 Phishing Report unveils the alarming sophistication of modern phishing attacks, driven…

8 hours ago