Hackers Target Critical WordPress Theme Vulnerability to Take Over Sites with Remote Plugin Installation

Published:

spot_img

Jul 31, 2025Ravie LakshmananVulnerability / Website Security

Recent security assessments have revealed a significant vulnerability in the "Alone – Charity Multipurpose Non-profit WordPress Theme," which could jeopardize websites relying on this plugin. This flaw, designated as CVE-2025-5394, has been assigned an alarming CVSS score of 9.8, indicating its severe nature. The security researcher Thái An has been pivotal in reporting this issue.

Details of the Vulnerability

According to findings from Wordfence, the vulnerability pertains to an arbitrary file upload feature that affects all versions of the plugin prior to 7.8.3. The issue has been rectified in the latest version, 7.8.5, which was released on June 16, 2025.

The root of this vulnerability lies in a function named "alone_import_pack_install_plugin()", which lacks proper capability checks. This oversight enables unauthenticated users to upload arbitrary plugins from external sources using AJAX, ultimately allowing for remote code execution.

Potential Exploits and Threats

István Márton from Wordfence stated, "This vulnerability enables an unauthenticated attacker to upload arbitrary files to a vulnerable site and achieve remote code execution, typically leading to a complete site takeover." This stark warning highlights the potential risks associated with the flaw, as it can allow malicious users to manipulate vulnerable sites easily.

Evidence suggests that the exploitation of CVE-2025-5394 began as early as July 12, 2025, just two days before the vulnerability was made public. This rapid exploitation indicates that some attackers were closely monitoring changes in the code for newly identified vulnerabilities.

Attempts to Exploit the Vulnerability

Since the discovery of this vulnerability, Wordfence has successfully blocked 120,900 attempts to exploit it. These malicious activities have been traced back to various IP addresses, including:

  • 193.84.71.244
  • 87.120.92.24
  • 146.19.213.18
  • 185.159.158.108
  • 188.215.235.94
  • 146.70.10.25
  • 74.118.126.111
  • 62.133.47.18
  • 198.145.157.102
  • 2a0b:4141:820:752::2

Common Tactics in Exploits

The attacks leveraging this vulnerability typically involve uploading ZIP archives, such as "wp-classic-editor.zip" or "background-image-cropper.zip". These archives often contain PHP-based backdoors, allowing attackers to execute remote commands and upload further malicious files. In addition, the exploits can deploy fully functioning file managers and backdoors capable of establishing unauthorized administrative accounts.

Recommendations for Site Owners

To protect against potential threats stemming from this vulnerability, WordPress site owners using the Alone theme are strongly advised to take immediate action. Steps include:

  • Updating to the latest version of the plugin.
  • Checking for any suspicious administrative users within the site’s backend.
  • Reviewing logs for any requests related to "/wp-admin/admin-ajax.php?action=alone_import_pack_install_plugin."

By following these recommendations, website administrators can significantly mitigate the risks associated with this critical vulnerability and better secure their online presence.

spot_img

Related articles

Recent articles

Cyberattacks Surge 245% Amid Iran War, Targeting Banks and Fintech Sectors

Cyberattacks Surge 245% Amid Iran War, Targeting Banks and Fintech Sectors Since the onset of the Iran war, cyber activity associated with the conflict has...

Cohesity Advances AI Resilience with Enhanced Data Protection and Security Solutions for Midsize Organizations

Cohesity Advances AI Resilience with Enhanced Data Protection and Security Solutions for Midsize Organizations Cohesity has unveiled a series of significant enhancements to its data...

Ajman NuVentures Centre Free Zone Strengthens Legal Framework with MoU Signing with DIFC Courts

Ajman NuVentures Centre Free Zone Strengthens Legal Framework with MoU Signing with DIFC Courts Ajman NuVentures Centre Free Zone (ANCFZ) has taken a significant step...

Georgian Man Indicted for Phishing Scam Targeting NBA and NFL Players from Federal Prison

Georgian Man Indicted for Phishing Scam Targeting NBA and NFL Players from Federal Prison A federal grand jury has indicted Kwamaine Jerell Ford, a 34-year-old...