Hackers Take Advantage of Authentication Bypass Vulnerability in Burst Statistics WordPress Plugin

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Security Breach: Critical Vulnerability in WordPress Plugin Exposes Admin Accounts

Cybercriminals are exploiting a severe authentication bypass flaw within the “Burst Statistics” plugin, gaining unauthorized admin-level access to numerous WordPress websites.

Burst Statistics, a plugin designed for privacy-conscious analytics, is utilized on approximately 200,000 WordPress sites and is promoted as a streamlined alternative to Google Analytics.

The vulnerability, identified as CVE-2026-8181, emerged with the release of version 3.4.0 on April 23 and continued to persist in the subsequent version, 3.4.1.

As reported by Wordfence, which detected CVE-2026-8181 on May 8, this flaw permits unauthenticated individuals to impersonate legitimate admin users during REST API transactions, enabling the creation of deceptive admin accounts.

“This vulnerability allows unauthorized attackers who possess a valid administrator username to fully mimic that administrator throughout any REST API request, including essential WordPress core endpoints such as /wp-json/wp/v2/users, simply by submitting an arbitrary and incorrect password via a Basic Authentication header,” Wordfence elaborates.

“In the most dire scenario, an attacker might exploit this vulnerability to establish a new administrator account without requiring any prior authentication.”

The crux of the issue lies in the flawed interpretation of the ‘wp_authenticate_application_password()’ function results, where a ‘WP_Error’ is erroneously regarded as a successful authentication response.

Moreover, researchers indicate that WordPress can return ‘null’ under certain conditions, which is mistakenly recognized as an authenticated request.

This erroneous handling allows the code to execute ‘wp_set_current_user()’ with the username provided by the assailant, thus impersonating the targeted user for the duration of the REST API request.

Admin usernames may be revealed through blog posts, comments, or even public API inquiries; attackers might also employ brute-force tactics to deduce them.

Admin-level access bestows a plethora of dangerous capabilities, enabling intruders to infiltrate private databases, implant backdoors, redirect unsuspecting visitors, disseminate malicious software, generate fictitious admin accounts, and beyond.

While Wordfence cautions that “this vulnerability is likely to be exploited by malicious actors, making immediate updating to the latest version imperative,” their tracker indicates that nefarious activities have already commenced.

The security firm has intervened to block more than 7,400 attacks targeting CVE-2026-8181 in just the past 24 hours, underscoring the severity of the situation.

Burst Statistics users are urged to upgrade to the patched version 3.4.2, which was released on May 12, 2026, or to disable the plugin entirely to mitigate risk.

a close up of a typewriter with the word wordpress printed on it

According to statistics from WordPress.org, Burst Statistics experienced 85,000 downloads post-release of version 3.4.2, suggesting that around 115,000 sites may still be vulnerable to potential admin takeover attacks.

Source link: Bleepingcomputer.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

Souvik Banerjee

I’m Souvik Banerjee from Kolkata, India. As a Marketing Manager at RS Web Solutions (RSWEBSOLS), I specialize in digital marketing, SEO, programming, web development, and eCommerce strategies. I also write tutorials and tech articles that help professionals better understand web technologies.
Share the Love
Related News Worth Reading