Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

Tesla is partially liable in Florida Autopilot Trial, ju apprentices award $329 million in damages

Nintendo raises original switch console prices due to “market situation”

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit critical WordPress theme flaws to hijacking sites via remote plugins
Identity

Hackers exploit critical WordPress theme flaws to hijacking sites via remote plugins

userBy userJuly 31, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 31, 2025Ravi LakshmananVulnerability/Website Security

Threat actors actively harness the critical security flaws of “only – Charity’s multipurpose non-profit WordPress theme” to take over sensitive sites.

The CVSS score for vulnerabilities tracked as CVE-2025-5394 is 9.8. Security researcher Thái An is believed to have discovered and reported the bug.

According to WordFence, this drawback is related to any file upload that affects all versions of plugins prior to 7.8.3. Addressed in version 7.8.5, released on June 16, 2025.

CVE-2025-5394 “rooted in a plugin installation function named alion_import_pack_install_plugin() and derived from missing feature checks, so you can deploy any plugin from a remote source via Ajax and achieve code execution.

“This vulnerability allows an unauthorized attacker to upload arbitrary files to a vulnerable site and enable remote code execution. This is usually exploited for complete site takeover.”

Evidence shows that CVE-2025-5394 began being exploited on July 12, two days before the vulnerability was published. This indicates that the threat actors behind the campaign may be actively monitoring code changes for newly addressed vulnerabilities.

Cybersecurity

The company said it has already blocked 120,900 exploit attempts targeting defects. The activity originated from the following IP address –

193.84.71.24487.120.92.24146.19.213.8185.159.158.108188.215.235.94146 .70.10.2574.118.126.11162.133.47.18198.145.157.1022A0B: 4141:820:752 :: 2

The observed attacks have been averaged to upload a zip archive (“wp-classic-editor.zip” or “background-image-cropper.zip”) containing PHP-based backdoors. It also delivers a fully functional file manager and backdoor that allows you to create rogue administrator accounts.

To mitigate potential threats, WordPress site owners using themes are recommended to apply the latest updates, check for suspicious admin users, and scan the logs of requests.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGithub Copilot has exceeded 20 million people’s history
Next Article UKAEA updates £9 million framework for fusion engineering
user
  • Website

Related Posts

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

August 1, 2025

Cursor AI code editor fixed the flaw that allows attackers to execute commands via SlackMCP

August 1, 2025

Attacker violates Microsoft 365 account using fake OAuth app with Tycoon kit

August 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

Tesla is partially liable in Florida Autopilot Trial, ju apprentices award $329 million in damages

Nintendo raises original switch console prices due to “market situation”

Details will be revealed about how Windsurf’s VCS and Founders were paid from Google transactions

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.