
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A critical vulnerability (CVE-2025-27007) has been identified in the OttoKit (formerly SureTriggers) WordPress plugin, affecting versions through 1.0.82. This unauthenticated Privilege Escalation vulnerability, discovered by Denver Jackson through the Patchstack Zero Day bug bounty program, has received a CVSS score of 9.8 (Critical). The plugin, developed by Brainstorm Force, has over 100,000 active installations and is widely used for automation and integration tasks across marketing, sales, and e-commerce environments (SecurityOnline, Patchstack).
The vulnerability exists in the createwpconnection function, accessible via the plugin's REST API endpoint: /wp-json/sure-triggers/v1/connection/create-wp-connection. The flaw stems from a logic error in processing responses from the wpauthenticateapplicationpassword function and insufficient token validation. The vulnerability allows attackers to bypass authentication if no application password is set by the administrator, requiring only knowledge of the administrator's username to exploit ([Patchstack Article](https://patchstack.com/articles/additional-critical-ottokit-formerly-suretriggers-vulnerability-patched?s_id=cve)).
Successful exploitation of this vulnerability could lead to an attacker obtaining full control of the website via the OttoKit plugin's API, including the ability to create additional Administrator-level user accounts. The impact is particularly severe given the plugin's widespread use across marketing, sales, and e-commerce environments (SecurityOnline).
Users are strongly advised to update to OttoKit version 1.0.83 or later, which contains the fix. The patch implements additional validation of the access key used for requests and corrects the underlying logic error. Website administrators should also review their access logs for suspicious REST API requests and audit user accounts for unexpected administrator entries (Patchstack).
The vulnerability has garnered significant attention in the security community, with Patchstack awarding the researcher $2,600 USD through their Zero Day bug bounty program. The WordPress.org Plugins Team collaborated with the vendor to push out a forced update to users of the plugin, demonstrating the severity of the vulnerability and the coordinated response from the WordPress security ecosystem (Patchstack Article).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”