CybersecurityMassive WordPress Breach: 20,000 Sites Exposed to Admin Takeover

Massive WordPress Breach: 20,000 Sites Exposed to Admin Takeover

Key Takeaways

  • A critical backdoor vulnerability (CVE-2026-0920) has been discovered in the LA-Studio Element Kit for Elementor WordPress plugin, used by over 20,000 active sites.
  • The vulnerability allows attackers to create administrator accounts without authentication, putting thousands of websites at risk of complete takeover.
  • The backdoor was introduced by a former employee who modified the plugin code before leaving the company, highlighting the importance of code review processes during employee transitions.
  • The vulnerability has been patched in version 1.6.0 of the plugin, and site administrators are advised to update immediately.

Introduction to the Vulnerability
A critical backdoor vulnerability has been discovered in the LA-Studio Element Kit for Elementor, a popular WordPress plugin used by more than 20,000 active sites. This security flaw allows attackers to create administrator accounts without any authentication, putting thousands of websites at risk of complete takeover. The vulnerability, tracked as CVE-2026-0920, carries a CVSS score of 9.8, marking it as a critical threat that requires immediate action from site administrators.

The Cause of the Vulnerability
The backdoor was introduced by a former employee who left the company in late December 2025. According to LA-Studio, the developer modified the plugin code shortly before their employment ended, inserting hidden functionality that allows unauthorized administrator account creation. This incident highlights the growing concern around insider threats and the importance of code review processes during employee transitions. The fact that the backdoor was introduced by a former employee underscores the need for companies to have robust security measures in place to prevent such incidents.

Discovery and Patching of the Vulnerability
Security researchers Athiwat Tiprasaharn, Itthidej Aramsri, and Waris Damkham discovered the vulnerability on January 12, 2026, and reported it through the Wordfence Bug Bounty Program. Wordfence analysts identified the flaw within the plugin’s user registration system, specifically in the ajax_register_handle function. The vulnerability was patched quickly, with version 1.6.0 released on January 14, 2026, just two days after the initial report. The vulnerability exists in all versions up to and including 1.5.6.3 of the LA-Studio Element Kit for Elementor plugin.

Exploitation of the Vulnerability
Attackers can exploit this flaw by sending a specially crafted registration request containing the lakit_bkrole parameter. Once successful, they gain full administrative access to the targeted WordPress site, allowing them to upload malicious files, modify content, redirect visitors to harmful websites, or inject spam content. The vulnerability details, including the affected plugin, plugin slug, and affected versions, are crucial for site administrators to understand the scope of the threat and take necessary actions to protect their websites.

The Obfuscated Backdoor Mechanism
The backdoor operates through a carefully hidden modification within the plugin’s registration handling system. When examining the code, Wordfence analysts found that the ajax_register_handle function contained obfuscated logic that checked for the presence of the lakit_bkrole parameter during user registration. If this parameter was detected, the function would trigger additional filters that assigned administrator privileges to the newly created account. The obfuscation included techniques like string manipulation and indirect function calls, making the malicious code blend seamlessly with legitimate plugin functionality.

Conclusion and Recommendations
The discovery of the backdoor vulnerability in the LA-Studio Element Kit for Elementor plugin highlights the importance of robust security measures, including code review processes and employee background checks. Site administrators are advised to update to version 1.6.0 of the plugin immediately to prevent potential attacks. Additionally, companies should prioritize insider threat prevention and have incident response plans in place to minimize the impact of such incidents. By taking proactive measures, website owners can protect their online presence and prevent unauthorized access to their sites.

- Advertisement -spot_img

More From UrbanEdge

Coinbase Insider Breach: Leaked Support Tool Screenshots

In May 2025, Coinbase experienced a sophisticated insider breach affecting 70,000 users. Hackers bribed support agents to leak sensitive data, resulting in over $2 million in theft through targeted scams. Coinbase responded by refusing ransom, launching a bounty program, and refunding victims...

Sector Impact Overview: Architecting the AI Integration Era

Sector Impact Overview: Architecting the AI Integration Era 1. Introduction:...

The Pulse of the Global Artificial Intelligence Landscape

This collection of news headlines highlights the rapidly evolving landscape...

NSW Police Tighten Protest Rules Ahead of Israeli President’s Visit

Key Takeaways The NSW Police commissioner has announced an extension...

Meet Team USA’s Most Seasoned Athlete: A Midwest Curler Bound for 2026 Olympics

Key Takeaways Rich Ruohonen, a 54-year-old curler from Minnesota, is...

Maddie Hall Inquest: Family Seeks Answers Over Mental Health Failures

Key Takeaways Madeleine Hall, a 16-year-old girl, died by suicide...

Will Arnett Booted Famous Comedian from Podcast After Just 10 Minutes

Key Takeaways: Will Arnett shares a harsh opinion about a...

Insider Threat: How Unhappy Employees Compromise Data Security

Key Takeaways Disgruntled employees pose a significant cybersecurity threat to...

Zillow’s Concerns Over Compass’ Rising Technology Threat

Key Takeaways: Zillow has identified Compass' growing suite of agent-...
- Advertisement -spot_img