Home icon Chevron Categories Chevron Blog Chevron News Chevron

WordPress Theme Vulnerability Under Active Exploitation, Allowing Full Site Takeovers

WordPress Theme Vulnerability Under Active Exploitation, Allowing Full Site Takeovers

July 31, 2025


A severe security flaw in the popular Alone – Charity Multipurpose Non-profit WordPress Theme is currently being exploited by malicious actors to compromise WordPress sites through unauthorized plugin installations.

Identified as CVE-2025-5394 and rated 9.8 on the CVSS scale, the flaw was discovered by security researcher Thái An. It impacts all theme versions up to 7.8.3 and has been patched in version 7.8.5, released on June 16, 2025.

According to Wordfence, the issue lies within the alone_import_pack_install_plugin() function, which fails to verify user capabilities. This oversight allows unauthenticated users to trigger remote plugin installations via AJAX, opening the door to arbitrary file uploads and remote code execution (RCE).

“This vulnerability lets attackers upload and execute arbitrary files without authentication—resulting in full control over the affected site,” said István Márton from Wordfence.

Attack attempts have been tracked back to July 12, suggesting the attackers may have been monitoring theme updates to exploit vulnerabilities before public disclosure.

To date, over 120,000 exploit attempts have been blocked, with activity traced to several IP addresses, including:

193.84.71.244, 87.120.92.24, 146.19.213.18, 185.159.158.108,
188.215.235.94, 146.70.10.25, 74.118.126.111, 62.133.47.18,
198.145.157.102, and 2a0b:4141:820:752::2

In these attacks, hackers often upload ZIP files (like wp-classic-editor.zip or background-image-cropper.zip) containing PHP-based backdoors. These allow remote command execution, upload of malicious files, and creation of rogue admin accounts using stealthy file managers.

Recommended Actions:
Website administrators using this theme should immediately update to the latest version, investigate any suspicious admin accounts, and review logs for signs of exploitation—particularly requests to:
/wp-admin/admin-ajax.php?action=alone_import_pack_install_plugin.

Stay alert, and keep your security measures updated!

Follow cybersecurity88 on X and LinkedIn for the latest cybersecurity news


Did you like the post? Share it in your media

Latest Articles

Featured

Iran-Linked MuddyWater Hackers Deploy New “Dindoor” Backdoor to Target U.S. Networks

March 06, 2026 · Chetna Sehgal

Cybersecurity researchers have recently uncovered a new cyber campaign linked to the Iranian hack...

Read More >
Featured

Microsoft Warns of ClickFix Attack Using Windows Terminal to Deploy Lumma Stealer

March 06, 2026 · Chetna Sehgal

Microsoft has recently revealed details about a new cyberattack campaign that is using a social-e...

Read More >
Featured

Global Operation Shuts Down Tycoon 2FA Phishing Service Behind 64,000 Attacks

March 05, 2026 · Chetna Sehgal

A major international law-enforcement operation has shut down Tycoon 2FA, a phishing-as-a-service...

Read More >
Featured

Mail2Shell Zero-Click Vulnerability Lets Hackers Hijack FreeScout Mail Servers

March 05, 2026 · Chetna Sehgal

A new cybersecurity vulnerability called Mail2Shell has been discovered in FreeScout, a popular o...

Read More >
Featured

Fake Laravel Packages on Packagist Deliver Cross-Platform RAT Targeting Developers

March 04, 2026 · Chetna Sehgal

A new cybersecurity threat has been discovered involving fake Laravel packages uploaded to the Pa...

Read More >
Featured

APT41-Linked Silver Dragon Launches Cyber-Espionage Campaign Against Governments Using Google Drive C2

March 04, 2026 · Chetna Sehgal

Cybersecurity researchers have recently uncovered a cyber-espionage campaign carried out by a thr...

Read More >
Newsletter line