Burst Statistics Under Fire: Over 7,400 Attacks Blocked in 24 Hours
Threat actors are actively exploiting a critical authentication bypass (CVE-2026-8181) in the Burst Statistics WordPress plugin to hijack administrative accoun…

Malicious actors are launching mass attacks against WordPress sites running versions 3.4.0 and 3.4.1 of the Burst Statistics plugin, targeting a critical vulnerability (CVE-2026-8181) disclosed on May 14, 2026. The flaw allows attackers to bypass authentication via the REST API using only a known administrator username, facilitating a complete site takeover. Wordfence reports blocking over 7,400 targeted attacks in the 24 hours preceding their report, while approximately 115,000 sites remain exposed, having failed to update to the patched version 3.4.2.
"This vulnerability allows unauthenticated attackers who know a valid administrator username to fully impersonate that administrator for the duration of any REST API request, including WordPress core endpoints such as /wp-json/wp/v2/users, by supplying any arbitrary and incorrect password in a Basic Authentication header"
— Wordfence, as reported by BleepingComputer
- The Burst Statistics plugin, active on roughly 200,000 WordPress sites, introduced the bug in versions 3.4.0 and 3.4.1 released on April 23, 2026.
- CVE-2026-8181 allows unauthenticated attackers to impersonate administrators using only a username via Basic Authentication headers on REST API endpoints.
- Wordfence blocked over 7,400 attacks in the 24 hours leading up to May 14, 2026; the 3.4.2 patch has been available since May 12.
- Approximately 115,000 sites remain potentially vulnerable, assuming the roughly 85,000 updates recorded on WordPress.org represent the only patched installations.
Logic Error: When Authentication Failure Grants Access
CVE-2026-8181 stems from a logic error within the Burst Statistics authentication module—a privacy-focused alternative to Google Analytics. In versions 3.4.0 and 3.4.1, released on April 23, 2026, the plugin incorrectly handles the return value of the native WordPress function wp_authenticate_application_password(). Rather than rejecting invalid credentials, the code treats both WP_Error objects and null values as successful authentication, creating a severe security breach.
This flaw allows an external attacker to trigger wp_set_current_user() with a known administrator username, gaining full admin privileges for the duration of the REST API request. No valid password or token is required; a Basic Authentication header containing any arbitrary string will suffice. The result is a total authentication bypass across critical WordPress core endpoints, including user management.
The Mechanics of Impersonation and Site Takeover
The exploitation path is alarmingly straightforward. An attacker sends a request to a REST API endpoint, such as /wp-json/wp/v2/users, including an Authorization header with a Basic Authentication token built from an existing admin username and a random password. The plugin, misinterpreting the authentication result, sets the user context to that administrator. From that point on, the request is processed with maximum privileges.
Once authenticated, attackers can create new administrative accounts, modify site content, install malicious plugins, or redirect traffic to malicious domains. As Wordfence noted in its May 14, 2026 report: "In a worst-case scenario, an attacker could exploit this flaw to create a new administrator-level account with no prior authentication whatsoever." This allows for a full site takeover without advanced technical prerequisites beyond knowing an admin username.
Active Campaign: 7,400+ Attacks in a Single Day
Malicious activity is already in an advanced stage. According to data released by Wordfence on May 14, 2026, the company's firewall intercepted over 7,400 attacks targeting CVE-2026-8181 in just 24 hours. This surge confirms that the vulnerability moved from technical disclosure to active exploitation within days of the 3.4.2 patch release on May 12.
The flaw was originally discovered on May 8, 2026, but the rapid shift to active exploitation left little room for late-acting administrators. With the patched version available only since May 12, there was a narrow four-day window where the community had to manage both the disclosure and the escalating offensive simultaneously.
It is currently impossible to determine exactly how many sites have been compromised beyond those where attacks were blocked, or if the assaults originate from a single coordinated campaign. However, the speed of the escalation suggests the vulnerability has already been integrated into automated exploit kits or mass scanning tools, significantly increasing the risk for any unpatched installation.
The Patch Gap: 115,000 Sites Remain Exposed
Adoption statistics from WordPress.org indicate that approximately 85,000 installations have updated since version 3.4.2 was released. Assuming these all represent moves to the patched version, roughly 115,000 sites remain vulnerable out of an estimated 200,000 active installs. However, it is not verified that every update was to version 3.4.2, nor that all lagging sites are necessarily running the specific buggy versions.
The discrepancy between patch availability and actual deployment highlights a chronic issue in the WordPress ecosystem: delayed updates leave sites exposed, even when they manage sensitive data or e-commerce. Ironically, Burst Statistics is marketed as a privacy-friendly tool; a utility designed to reduce tracking exposure became a vector for administrative takeover due to a single logic error in a recent release.
This incident also raises questions regarding code review processes for plugins that handle statistics without personal data collection. If a relatively simple tool can introduce such an elementary authentication bug, the implicit trust users place in "low-risk," privacy-focused software can become a significant risk factor.
Immediate Mitigation: Audit and Update
WordPress administrators using Burst Statistics must take immediate action to secure their environments. The highest priority is verifying the installed version: if the site is still running 3.4.0 or 3.4.1, the exposure is active and critical.
- Update immediately to 3.4.2. The vendor released the patch on May 12, 2026. Delays leave the site open to automated takeover attempts.
- Audit administrator accounts. Check for unauthorized admin accounts, particularly those that may have been created via REST API endpoints like
/wp-json/wp/v2/users. - Review server and firewall logs. Search for anonymous requests with Basic Authentication headers targeting REST API endpoints that returned HTTP 200 status codes instead of 401 or 403.
- Inspect files and themes. In cases of suspected compromise, scan for backdoors, hidden redirects, or suspicious plugins installed after the release of the vulnerable versions.
The CVE-2026-8181 incident proves that even niche, privacy-first plugins can become critical compromise vectors. The issue lies not just in code maturity but in the speed with which a logic error is weaponized against a user base that often lags in patching. For the CMS industry, the lesson remains that the line between a "harmless tool" and a "major attack surface" is thinner than many assume.
Frequently Asked Questions
Why is knowing only a username enough for this attack?
The vulnerability bypasses password validation entirely. The attacker provides a valid username and any password; the plugin misinterprets the resulting authentication failure as a success and grants the request administrative privileges.
Is version 3.4.1.1 vulnerable as reported by some databases?
Wordfence identifies versions 3.4.0 and 3.4.1 as affected. While some databases, such as Patchstack, mention 3.4.1.1, it remains unconfirmed in current primary reports whether that specific release contains the vulnerable code.
What are the concrete risks for a compromised site?
Successful exploitation grants administrative access, allowing attackers to create backdoors, alter content, redirect visitors, or exfiltrate any sensitive data stored within the WordPress database.
Information has been verified against cited sources and is current as of the time of publication.