Authentication bypass in Burst Statistics WordPress plugin enables admin takeover (CVE-2026-8181)
Summary
Hide ▲
Show ▼
Unpatched installations of the WordPress analytics plugin Burst Statistics (versions 3.4.0 and 3.4.1) are being actively exploited due to a critical authentication bypass flaw, CVE-2026-8181. The vulnerability allows unauthenticated remote attackers to impersonate any privileged WordPress user—including administrators—during REST API requests by supplying an arbitrary password. Successful exploitation can grant full administrative control, enabling site takeover, database access, backdoor deployment, visitor redirection to malicious destinations, malware distribution, and creation of rogue administrator accounts. Admin usernames may be exposed through public content or API endpoints, or guessed via brute-force methods. The issue stems from incorrect handling of authentication results in the ‘wp_authenticate_application_password()’ function, where WP_Error and null values are erroneously treated as authenticated states.
Timeline
-
15.05.2026 00:07 1 articles · 2h ago
Active exploitation of Burst Statistics authentication bypass (CVE-2026-8181) underway
Exploitation of CVE-2026-8181 in the Burst Statistics WordPress plugin has escalated, with threat actors leveraging an auth bypass to impersonate administrators and obtain full site control. The vulnerability affects versions 3.4.0 and 3.4.1 and stems from flawed handling of authentication outcomes in wp_authenticate_application_password(). Wordfence has observed over 7,400 attack attempts in the past 24 hours, underscoring the immediate operational risk. A patched release, version 3.4.2, was issued on May 12, 2026.
Show sources
- Hackers exploit auth bypass flaw in Burst Statistics WordPress plugin — www.bleepingcomputer.com — 15.05.2026 00:07
Information Snippets
-
CVE-2026-8181 affects Burst Statistics plugin versions 3.4.0 and 3.4.1, introduced in the April 23, 2026 release.
First reported: 15.05.2026 00:071 source, 1 articleShow sources
- Hackers exploit auth bypass flaw in Burst Statistics WordPress plugin — www.bleepingcomputer.com — 15.05.2026 00:07
-
The flaw enables unauthenticated attackers to impersonate any known admin user during REST API requests, including core endpoints such as /wp-json/wp/v2/users, by sending a Basic Authentication header with an arbitrary password.
First reported: 15.05.2026 00:071 source, 1 articleShow sources
- Hackers exploit auth bypass flaw in Burst Statistics WordPress plugin — www.bleepingcomputer.com — 15.05.2026 00:07
-
Exploitation can result in full administrative account takeover, backdoor installation, database access, visitor redirection to malicious sites, malware distribution, and creation of additional rogue admin accounts without prior authentication.
First reported: 15.05.2026 00:071 source, 1 articleShow sources
- Hackers exploit auth bypass flaw in Burst Statistics WordPress plugin — www.bleepingcomputer.com — 15.05.2026 00:07
-
The root cause is incorrect interpretation of authentication results in wp_authenticate_application_password(), specifically treating WP_Error and null as successful authentication, leading to calls to wp_set_current_user() with attacker-supplied usernames.
First reported: 15.05.2026 00:071 source, 1 articleShow sources
- Hackers exploit auth bypass flaw in Burst Statistics WordPress plugin — www.bleepingcomputer.com — 15.05.2026 00:07
-
Wordfence discovered the vulnerability on May 8, 2026, and reported that over 7,400 attacks targeting CVE-2026-8181 were blocked in the past 24 hours as of May 14, 2026.
First reported: 15.05.2026 00:071 source, 1 articleShow sources
- Hackers exploit auth bypass flaw in Burst Statistics WordPress plugin — www.bleepingcomputer.com — 15.05.2026 00:07
-
A patched version, 3.4.2, was released on May 12, 2026. Users are advised to upgrade immediately or disable the plugin to mitigate risk.
First reported: 15.05.2026 00:071 source, 1 articleShow sources
- Hackers exploit auth bypass flaw in Burst Statistics WordPress plugin — www.bleepingcomputer.com — 15.05.2026 00:07