Raleigh, NC

32°F
Scattered Clouds Humidity: 79%
Wind: 2.06 M/S

WordPress Theme Flaw Lets Hackers Take Over Sites

WordPress Theme Flaw Lets Hackers Take Over Sites

Cybercriminals are actively taking advantage of a severe vulnerability in the "Alone – Charity Multipurpose Non-profit WordPress Theme" to seize control of vulnerable websites. 

The flaw, identified as CVE-2025-5394 and carrying a CVSS score of 9.8, was discovered and reported by security researcher Thái An. Wordfence reports that the issue involves an arbitrary file upload vulnerability affecting all theme versions up to and including 7.8.3. A fix was introduced in version 7.8.5 on June 16, 2025. 

The vulnerability stems from a plugin installation function called alone_import_pack_install_plugin() which lacks a proper capability check. This oversight allows unauthenticated users to upload plugins from external sources via AJAX, leading to remote code execution. 

"This flaw enables attackers to upload arbitrary files and execute code remotely, which often results in complete site takeovers," said Wordfence's István Márton. 

Exploitation of the flaw began on July 12, two days before public disclosure suggesting attackers may have been monitoring code changes to detect newly patched weaknesses. Wordfence has already blocked more than 120,000 exploit attempts linked to this vulnerability. Attacks have originated from the following IP addresses: 

  • 193.84.71.244 
  • 87.120.92.24 
  • 146.19.213.18 
  • 185.159.158.108 
  • 188.215.235.94 
  • 146.70.10.25 
  • 74.118.126.111 
  • 62.133.47.18 
  • 198.145.157.102 

2a0b:4141:820:752::2 

During these attacks, threat actors commonly upload ZIP files like "wp-classic-editor.zip" or "background-image-cropper.zip" that include PHP-based backdoors to execute commands remotely and upload additional files. These payloads often contain advanced file managers and scripts that can create rogue admin accounts. 

To reduce exposure, WordPress site owners using the affected theme should immediately update to the latest version, review admin accounts for unauthorized access, and check server logs for suspicious activity related to the URL /wp-admin/admin-ajax.php?action=alone_import_pack_install_plugin

 

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.