On May 2, 2025, the Wordfence Threat Intelligence team added a new critical vulnerability to the Wordfence Intelligence vulnerability database in the OttoKit: All-in-One Automation Platform (formerly SureTriggers) plugin. This vulnerability, publicly disclosed by a third-party CNA on April 30, 2025, allows unauthenticated attackers to gain administrative-level access to vulnerable WordPress sites under certain conditions. The vulnerability is tracked as CVE-2025-27007 and has a CVSS score of 9.8 (Critical).
The OttoKit plugin is designed to automate workflows across various applications and services. However, a flaw in the plugin’s authentication mechanism has exposed numerous WordPress sites to potential compromise. (Wordfence)
Vulnerability Details
- Plugin Name: OttoKit: All-in-One Automation Platform (formerly SureTriggers)
- Plugin Slug: suretriggers
- Affected Versions: <= 1.0.82
- CVE ID: CVE-2025-27007
- CVSS Score: 9.8 (Critical)
- Fully Patched Version: 1.0.83
- Researcher: Denver Jackson
The vulnerability stems from the create_wp_connection()
function, which lacks proper capability checks and insufficiently verifies user authentication credentials. This oversight allows unauthenticated attackers to establish a connection, potentially leading to privilege escalation.
Exploitation is possible in two scenarios:
- If a site has never enabled or used an application password, and OttoKit/SureTriggers has never been connected to the website using an application password.
- If an attacker has authenticated access to a site and can generate a valid application password.
Active Exploitation
Wordfence’s records indicate that attackers may have started actively exploiting this vulnerability as early as May 2, 2025, with mass exploitation beginning on May 4, 2025. The Wordfence Firewall has already blocked over 2,400 exploit attempts targeting this vulnerability.
All Wordfence Premium, Wordfence Care, and Wordfence Response customers received a firewall rule to protect against any exploits targeting this vulnerability on May 2, 2025. Sites using the free version of Wordfence will receive the same protection 30 days later on June 1, 2025.
The developer of OttoKit worked with the WordPress.org team to perform a forced update, so the majority of sites should already be running the patched version of the plugin, 1.0.83. Site administrators are strongly advised to verify that their site is running the latest patched version and update it without delay if it is not, as this vulnerability is under active exploitation.
Indicators of Compromise
Attackers are exploiting the initial connection vulnerability to establish a connection with the site and then create an administrative user account through the automation/action endpoint. They are also attempting to exploit CVE-2025-3102, indicating that they are targeting multiple vulnerabilities to compromise sites.
Exploits targeting CVE-2025-3102 can be distinguished by the presence of an empty St-Authorization
header in the request.
Example Initial Request
POST /wp-json/sure-triggers/v1/connection/create-wp-connection HTTP/1.1
Host: [redacted]
User-Agent: OttoKit
Content-Type: application/json
{
"sure-triggers-access-key": "[redacted]",
"wp-password": "[redacted]",
"connection_status": "ok",
"wp-username": "wp_owsr",
"connected_email": "[redacted]"
}
Example Admin Creation Request
POST /wp-json/sure-triggers/v1/automation/action HTTP/1.1
Host: [redacted]
User-Agent: OttoKit
Content-Type: application/x-www-form-urlencoded
selected_options[user_name]=wp_domc&
selected_options[user_email]=[redacted]&
selected_options[password]=[redacted]&
selected_options[role]=administrator&
aintegration=WordPress&
type_event=create_user_if_not_exists
Top IPs Targeting the Vulnerability
The following IP addresses have been identified as actively targeting the vulnerable endpoints:
- 41.216.188.205 – Over 870 blocked requests
- 144.91.119.115 – Over 690 blocked requests
- 194.87.29.57 – Over 500 blocked requests
- 2a0b:4141:820:1f4::2 – Over 200 blocked requests
- 196.251.69.118 – Over 25 blocked requests
Additionally, IP 107.189.29.12 has made over 139,000 blocked requests targeting the automation/action endpoint, indicating exploitation of both CVE-2025-3102 and CVE-2025-27007.
Administrative User Accounts
Attackers are creating administrative user accounts with specific username patterns:
- Usernames prefixed with
wp_
followed by four random letters (e.g.,wp_pfuq
) - Usernames prefixed with
xtw18387
followed by random characters (e.g.,xtw18387e9db
) - Usernames prefixed with
admin_
followed by random alphanumeric characters (e.g.,admin_iw0ag5sx
) - Usernames prefixed with
test_
followed by random alphanumeric characters (e.g.,test_iajt388i
)
Recommendations
To mitigate the risk of exploitation, site administrators should take the following actions:
- Update the Plugin: Ensure that OttoKit is updated to version 1.0.83 or later.
- Verify User Accounts: Check for unauthorized administrative user accounts, especially those matching the patterns mentioned above.
- Review Logs: Examine server logs for requests to the following endpoints:
/wp-json/sure-triggers/v1/connection/create-wp-connection
/wp-json/sure-triggers/v1/automation/action
- Implement Application Passwords: Use application passwords for all integrations to prevent unauthorized access.
- Install Security Plugins: Utilize security plugins like Wordfence to provide additional protection and monitoring.
- Regular Backups: Maintain regular backups of your website to facilitate recovery in case of compromise.
- Monitor for Updates: Stay informed about plugin updates and security advisories.
- Limit Access: Restrict access to the WordPress admin panel to trusted IP addresses where possible.
- Educate Users: Train users on security best practices to prevent social engineering attacks.
- Engage Security Services: Consider using services like Wordfence Care or Wordfence Response for incident response and site cleaning.
Conclusion
The critical vulnerability in the OttoKit plugin underscores the importance of proactive security measures and timely updates. With active exploitation underway, it is imperative for site administrators to act swiftly to secure their websites. Regular monitoring, adherence to security best practices, and the use of reputable security tools can significantly reduce the risk of compromise.
For further assistance, Wordfence offers Incident Response services via Wordfence Care and Wordfence Response, providing hands-on support and rapid response times to address security incidents.