WHAT ARE YOU LOOKING FOR?

Raleigh, NC

32°F
Broken Clouds Humidity: 89%
Wind: 1.54 M/S

Critical Crawlomatic Flaw Puts Thousands of WordPress Sites at Risk

Critical Crawlomatic Flaw Puts Thousands of WordPress Sites at Risk

Critical Security Flaw Found in Popular WordPress Plugin Crawlomatic 

A major security flaw has been identified in the widely used WordPress plugin Crawlomatic Multisite Scraper Post Generator, potentially putting thousands of websites at risk. Listed as CVE-2025-4389, the vulnerability enables unauthenticated attackers to upload malicious files, which could lead to remote code execution on vulnerable sites. 

Crawlomatic, sold for $59 per license on the Envato CodeCanyon marketplace, is a well-known autoblogging plugin. It allows users to automatically scrape and republish content from various sources including forums, RSS feeds, weather data, and JavaScript-heavy websites. Its marketing promises to transform a site into a money-making tool. 

The plugin's sales page highlights several quality assurance badges, claiming compliance with Envato’s WordPress standards and best practices. These claims are now under scrutiny following the discovery of this severe security issue. 

Details of CVE-2025-4389 

The root of the problem is a lack of file type validation in the crawlomatic_generate_featured_image() function. All plugin versions up to and including 2.6.8.1 are affected. This flaw allows attackers to upload any type of file, including harmful scripts, without needing to authenticate. Security firm Wordfence, which reported the flaw, confirmed that successful exploitation can result in full site compromise through remote code execution. 

  • Vulnerability Name: Unauthenticated Arbitrary File Upload 
  • Affected Versions: Up to 2.6.8.1 
  • Patched Version: 2.6.8.2 
  • CVSS Score: 9.8 (Critical) 
  • CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 
  • Disclosure Date: May 16, 2025 
  • Discovered by: Foxyyy 

Why This Matters 

This vulnerability is especially dangerous because it can be exploited easily. It requires no login credentials or user interaction and can be used to upload malicious files that grant attackers full control of the server. With a CVSS score of 9.8, this issue is categorized as critical. 

Website administrators using Crawlomatic are strongly advised to update to version 2.6.8.2 immediately to mitigate this risk. 

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.