WordPress plugin AUTH -BYPASS utilized almost immediately after revealing


  • An error in Ottokit allows threat players to create new admin accounts
  • The error can lead to full takeover of sites
  • More than 100,000 sites are at risk

Almost immediately after being passed on to the public, a vulnerability in a WordPress plugin used in an attack was warned.

Wordfence revealed an approval compass in Ottokit, the all-in-a-working processing approval platform, the track as CVE-2025-3102, and got a severity of 8.1/10 (high).

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top