A critical Remote Code Execution (RCE) vulnerability (CVE‑2025‑5394) has been identified in the Alone Charity Multipurpose WordPress Theme, particularly in versions 7.8.3 and earlier. This flaw is currently under active exploitation.
Reports indicate that over 120,000 attempts have been documented against more than 9,000 vulnerable websites. This alarming trend has enabled cybercriminals to inject malicious plugins and execute arbitrary code by taking advantage of unauthenticated upload capabilities.
Further compounding the situation, another vulnerability (CVE‑2025‑5393) facilitates arbitrary file deletion, greatly enhancing the potential for site takeover. In some instances, these vulnerabilities have been exploited in tandem with the Bears Backup plugin RCE (CVE‑2025‑5396), granting attackers even deeper access.
Other High-Profile WordPress Exploits in 2025
Security experts highlight that the exploitation of the Alone theme is merely a single instance among numerous recent attacks of similar gravity. In the initial months of 2025, attackers successfully exploited at least four prominent plugins and themes that were revealed to have critical vulnerabilities in 2024 but remained unpatched:
- WordPress Automatic Plugin (CVE‑2024‑27956): A SQL injection vulnerability affecting data exports, with over 6,500 blocked attempts documented.
- Startklar Elementor Addons (CVE‑2024‑4345): An unauthenticated file upload oversight permitted unauthorized plugin installations, paving the way for backdoor creation.
- Bricks Theme (CVE‑2024‑25600): RCE via the REST API route allowed for unauthorized execution of PHP scripts.
- GiveWP Donation Plugin (CVE‑2024‑8353): PHP object injection vulnerabilities on donation forms facilitated complete site compromises.
Emerging plugin challenges have also surfaced in 2025:
- Post SMTP Plugin (CVE‑2025‑24000): A breach of access control that exposed email logs to lower-privileged users, while also enabling unauthorized admin password resets. An estimated 160,000 sites remain unpatched.
- BuddyBoss Platform Pro (CVE‑2025‑1909): A vulnerability that allowed Apple OAuth bypass, enabling the impersonation of privileged users.
- PGS Core Plugin (CVE‑2025‑0855): A risk of PHP object injection is present in versions up to 5.8.0.
- PeproDev Ultimate Profile Solutions (CVE‑2025‑3844): An authentication bypass enabling unauthorized admin login access.
- Simple Payment, FunnelKit, Custom APIs (CVE‑2025‑4334 / 6065 / 4973 / 1562 / 5486 / 5701): Multiple vulnerabilities related to privilege escalation and file deletion were discovered in plugins such as FunnelKit and the Golo Travel theme.
Widespread Impacts and Emerging Attack Tactics
More than 20,000 WordPress websites have been compromised due to malicious JavaScript backdoors concealed within the mu-plugins directory. This has enabled stealthy persistence strategies and visitor redirect attacks.
A significant supply-chain compromise involving the Gravity Forms plugin in July 2025 disseminated malware through legitimate downloads, impacting users of versions 2.9.11.1 and 2.9.12.
Moreover, the enduring DollyWay campaign continues to wreak havoc globally, redirecting traffic to adware-laden domains and exploiting various plugin and theme vulnerabilities.
Urgent Security Recommendations
- Upgrade the Alone theme to version 7.8.5 without delay.
- Examine logs for any suspicious POST requests directed to
/wp-admin/admin-ajax.php?action=alone_import_pack_install_plugin
. - Immediately patch or disable plugins with known critical CVEs.
- Conduct a thorough audit of AJAX logs for any suspicious endpoints.
- Review administrator accounts and eliminate unauthorized users promptly.
- Scan the mu-plugins directory for any rogue PHP or JavaScript files.
- Implement firewalls, enable multi-factor authentication, and closely monitor plugin installations.
The presence of unpatched plugins and themes constitutes a significant vulnerability within the WordPress ecosystem. Hackers have exploited numerous critical vulnerabilities within a mere 24 hours of their public disclosure throughout 2024 and 2025, employing AI-driven scanners to expedite attacks on a grand scale.
Source link: Techjuice.pk.