
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability (CVE-2025-27007) has been identified in the OttoKit (formerly SureTriggers) WordPress plugin, affecting versions through 1.0.82. This unauthenticated Privilege Escalation vulnerability was discovered by Denver Jackson through the Patchstack Zero Day bug bounty program and received a CVSS score of 9.8 (Critical). The plugin, developed by Brainstorm Force, has over 100,000 active installations and is widely used for automation and integration tasks across marketing, sales, and e-commerce environments (Patchstack Database, Hacker News).
The vulnerability exists in the createwpconnection function, accessible via the plugin's REST API endpoint: /wp-json/sure-triggers/v1/connection/create-wp-connection. The flaw stems from a logic error in processing responses from the wpauthenticateapplicationpassword function and insufficient token validation. The vulnerability allows attackers to bypass authentication if no application password is set by the administrator, requiring only knowledge of the administrator's username to exploit ([Patchstack Article](https://patchstack.com/articles/additional-critical-ottokit-formerly-suretriggers-vulnerability-patched?s_id=cve)).
Successful exploitation of this vulnerability could lead to an attacker obtaining full control of the website via the OttoKit plugin's API, including the ability to create additional Administrator-level user accounts. The impact is particularly severe given the plugin's widespread use across marketing, sales, and e-commerce environments (Hacker News).
Users are strongly advised to update to OttoKit version 1.0.83 or later, which contains the fix. The patch implements additional validation of the access key used for requests and corrects the underlying logic error. The WordPress.org Plugins Team collaborated with the vendor to push out a forced update to users of the plugin. Website administrators should also review their access logs for suspicious REST API requests and audit user accounts for unexpected administrator entries (Patchstack Database).
The vulnerability has garnered significant attention in the security community, with Patchstack awarding the researcher $2,600 USD through their Zero Day bug bounty program. The WordPress.org Plugins Team collaborated with the vendor to push out a forced update to users of the plugin, demonstrating the severity of the vulnerability and the coordinated response from the WordPress security ecosystem (Patchstack Article).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."