Security & Infrastructure Tools
Hackers Exploit Auth Bypass Flaw in Burst Statistics WordPress Plugin
Hackers are exploiting a critical authentication bypass in the Burst Statistics WordPress plugin (CVE-2026-8181), allowing unauthenticated attackers to impersonate admins via REST API and potentially create rogue admin accounts. The flaw was introduced in version 3.4.0 (April 23) and persisted in 3.4.1. Wordfence began tracking on May 8, with thousands of attacks blocked in 24 hours. A patched release, version 3.4.2, arrived on May 12, 2026; users should upgrade or disable the plugin. With about 200,000 sites using Burst Statistics, an estimated 115,000 could still be at risk if they remain on older versions.

HACKERS EXPLOIT AUTH BYPASS FLAW IN BURST STATISTICS WORDPRESS PLUGIN
OverviewA critical authentication bypass vulnerability has been leveraged by hackers against the Burst Statistics WordPress plugin. The plugin, designed as a privacy-focused analytics alternative to Google Analytics and deployed on thousands of WordPress sites, was found to contain a flaw that enables unauthenticated actors to impersonate site administrators during REST API requests. The flaw was introduced with the 3.4.0 release on April 23 and was still present in 3.4.1, before a patched version was issued.
What happened
- Attackers can impersonate known administrator users during REST API interactions by supplying arbitrary data in a Basic Authentication header.
- The impersonation applies to core WordPress endpoints, including the widely used /wp-json/wp/v2/users path.
- In the worst case, an attacker could create a new administrator-level account without any prior authentication.
Technical contextRoot cause
- The vulnerability stems from an incorrect interpretation of the result returned by wpauthenticateapplication_password().
- A WP_Error response, which should indicate a failed authentication, was misread as a successful authentication.
- WordPress can also return null in some scenarios, which was mistakenly treated as authentication success.Impact of the misinterpretation
- The code path can call wpsetcurrent_user() with the attacker-supplied username, effectively granting admin privileges for the duration of the REST API request.
- This leads to full admin impersonation and control over the affected session.
Possible consequences for a site
- Admin-level access can expose private databases and configuration data.
- Attackers can plant backdoors, reconfigure redirects, or host malicious content.
- Rogue administrator accounts can be created and retained across sessions, enabling persistent access.
Timeline and exploitation signalsDiscovery and disclosure
- The issue was identified and reported by Wordfence on May 8.Exploitation activity
- Security telemetry indicates ongoing exploitation attempts targeting CVE-2026-8181, with blocking events recorded by Wordfence.
- In a 24-hour window, Wordfence logged thousands of blocked attempts, underscoring the rapid and broad targeting of the vulnerability.
Patch and exposure status
- Patch released: version 3.4.2 on May 12, 2026.
- Download activity post-patch suggests a substantial remaining exposure: WordPress.org statistics show approximately 85,000 downloads of 3.4.2 since its release, implying about 115,000 sites may still be vulnerable to admin takeover under prior versions.
- The plugin is widely distributed, with tens of thousands of sites actively using Burst Statistics, amplifying the potential impact of the flaw.
Scope and exposure indicators
- Burst Statistics was actively installed on a large number of WordPress sites, with a user base approaching 200,000 sites.
- Public and semi-public data points indicate that admin usernames may be exposed across posts, comments, or API calls, which can facilitate targeted attempts to guess credentials or usernames in combination with the bypass flaw.
- Even with a patched release, a significant portion of sites remains at risk if they have not updated to 3.4.2 or later.
Root cause resolution and what changed
- The patch for version 3.4.2 addresses the incorrect handling of authentication results, ensuring WP_Error and null responses are interpreted correctly in authentication flows.
- The update prevents the unintended granting of authenticated state based on flawed results, thereby blocking the impersonation pathway during REST API requests.
Observations and context
- Security researchers and breach intelligence platforms emphasize the likelihood of targeted exploitation given the ease of impersonating admin users once the vulnerability is triggered.
- Public-facing API endpoints and admin-related routes are particularly sensitive, and unauthorized access to these paths can yield high-value access for attackers.
Related context and references
- The vulnerability is tracked as CVE-2026-8181 and has been associated with intensified activity in threat telemetry from major security researchers.
- Public reporting and analysis have highlighted the potential for rapid exploitation and the importance of applying the patched release where possible.
Notes on public impact
- The Burst Statistics plugin’s emphasis on privacy-friendly analytics has not mitigated the risk posed by this flaw, which centers on authentication handling rather than data collection practices.
- The combination of unauthenticated REST API abuse and admin impersonation creates a pathway for full site compromise under affected versions.
Contextual summary
- Burst Statistics, a widely used WordPress analytics plugin, contained a critical authentication bypass introduced in 3.4.0 (April 23) and present in 3.4.1.
- The vulnerability, CVE-2026-8181, enabled impersonation of administrators via REST API calls using a valid username and a manipulated Basic Authentication header.
- A patch (3.4.2) was released on May 12, 2026, but a substantial number of sites remained at risk according to post-patch download statistics and observed activity.
- Security observers continue to monitor and document attempts to exploit the flaw, with notable emphasis on the potential for rogue admin accounts and broader site compromise.


