

APT32 Hackers Exploit GitHub to Target Cybersecurity Experts and Enterprises – Active IOCs
April 11, 2025
Agent Tesla Malware – Active IOCs
April 11, 2025
APT32 Hackers Exploit GitHub to Target Cybersecurity Experts and Enterprises – Active IOCs
April 11, 2025
Agent Tesla Malware – Active IOCs
April 11, 2025Severity
High
Analysis Summary
A serious security issue discovered in the OttoKit plugin for WordPress, which was previously known as SureTriggers. This plugin helps users connect different tools like WooCommerce, Mailchimp, and Google Sheets to automate tasks such as sending emails or updating customer information without needing to write any code. It's quite popular, being used on over 100,000 websites.
The problem, identified as CVE-2025-3102, was found in the plugin's authentication system. Specifically, the function responsible for verifying users through the REST API didn't properly check if a required security key was present. If the plugin wasn't set up with an API key, this security key would be empty. Attackers could exploit this by sending a request with an empty 'st_authorization' header, effectively bypassing the authentication check. This allowed them to gain unauthorized access to the site's API endpoints.
Hackers began exploiting the vulnerability just a few hours after it was made public. Security experts observed attempts to create new administrator accounts using random usernames and passwords, indicating automated attacks.
The rapid exploitation of this vulnerability highlights the urgent need to apply patches or implement mitigations immediately after public disclosure. Notably, exploitation attempts have already been observed, with one originating from the IP address 89.169.15.201 (IPv4), emphasizing the importance of swift action to protect against potential threats.
Impact
- Unauthorized Access
- Authentication Bypass
Indicators of Compromise
CVE
CVE-2025-3102
Affected Vendors
- WordPress
Affected Products
- OttoKit: All-in-One Automation Platform (Formerly SureTriggers) -1.0.78
Remediation
- Refer to WordPress Plugins Security Advisory for patch, upgrade, or suggested workaround information.
- Update the OttoKit/SureTriggers plugin to version 1.0.79 or later immediately.
- Review your website's user accounts and remove any unauthorized administrator accounts.
- Examine logs for unusual activities, such as unexpected plugin installations or changes to security settings.
- Ensure that the plugin is configured with a valid API key to prevent authentication bypass.
- Implement a Web Application Firewall (WAF) to block malicious requests targeting known vulnerabilities.
- Regularly monitor security advisories for updates on plugins and apply patches promptly.
- Consider using security plugins like Wordfence to enhance protection against exploits.
- Educate all administrators about the importance of timely updates and security best practices.