Hackers Actively Taking Advantage of WordPress Plugin Security Flaw to Obtain Admin Permissions

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Exploitation of WordPress Plugin Vulnerability Escalates

In recent months, malicious actors have adeptly capitalized on a serious authentication bypass vulnerability within the Service Finder Bookings WordPress plugin, enabling unprecedented access to compromised accounts across numerous sites.

This critical flaw was initially disclosed on July 31, 2025, following a bug bounty investigation that unearthed the plugin’s servicefinderswitchback function, which improperly validated a user-switch cookie, leading to unauthorized privilege escalation.

Following its revelation, adversaries promptly reverse-engineered the vulnerability, instigating a series of exploitation campaigns that escalated from August 1 into September, with alarming rapidity.

During this perilous phase, the Wordfence Firewall successfully thwarted over 13,800 exploitation attempts targeting thousands of installations running the vulnerable versions of the plugin.

In the initial stages of the attacks, threat actors dispatched meticulously crafted HTTP requests embedding a malicious originaluserid cookie, thereby circumventing authentication protocols entirely.

Person wearing a WordPress t-shirt typing on a keyboard at a desk with a computer monitor and a WordPress-themed mug.

Wordfence analysts observed a pronounced increase in irregular switchback requests mere hours post-disclosure, which necessitated the swift implementation of a firewall rule for all Wordfence Premium, Care, and Response clientele.

CVE IDAffected PluginVersions AffectedPatched VersionCVSS 3.1 ScoreAttack Vector
CVE-2025-5947Service Finder Bookings≤ 6.06.19.8Authentication Bypass

Notably, installations utilizing the free version of the plugin received protective measures only after a 30-day delay, leaving many instances of this software vulnerable until mid-July.

The ramifications of successful exploitation are dire: an unauthorized user can obtain comprehensive administrative privileges, facilitating backdoor installations, data exfiltration, or even complete site defacement.

With more than 6,000 active installations of the susceptible plugin, the threat landscape expanded as scanning bots and automated exploit kits began to probe for Service Finder Bookings endpoints.

Mechanisms of Infection

An examination of the exploit reveals that attackers target the servicefinderswitchback endpoint by submitting a GET request to ?switchback=1, accompanied by the Cookie: originaluserid=.

The plugin code subsequently executes:

if ( isset( $_COOKIE['originaluserid'] ) ) {
    $originaluserid = intval( $_COOKIE['originaluserid'] );
    wp_set_current_user( $originaluserid );
    wp_set_auth_cookie( $originaluserid, true );
}

Due to the absence of authentication or nonce checks, the user ID provided by the attacker is accepted unconditionally, logging them in as that user—often as the site administrator.

This straightforward yet potent bypass illuminates the pressing necessity for meticulous input validation within session-management protocols.

Source link: Cybersecuritynews.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading