WordPress Plugin Auth Bypass exploited almost immediately after the dissemination


  • An error in Ottokit allows the threat actors to create new administration accounts
  • The error can lead to the complete acquisition of the website
  • More than 100,000 websites are at risk

Almost immediately after being revealed to the public, vulnerability was used in a WordPress complement in an attack, security researchers warned.

Earlier this week, the Wordfence security team revealed an authentication bypass in Ottokit, the work flow authentication platform all in one. Vulnerability is tracked as CVE-2025-3102, and received a gravity score 8.1/10 (high).

Leave a Comment

Your email address will not be published. Required fields are marked *