Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Bitcoin price target $ 116,000 matches the major liquidity wall

    August 4, 2025

    5 of my favorite Linux System – Monitoring Tools – and why I use them

    August 4, 2025

    The best shows like ‘Wednesday’ you should watch ahead

    August 4, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Hackers actively exploited important RCE in WordPress Alone theme
    Security

    Hackers actively exploited important RCE in WordPress Alone theme

    PineapplesUpdateBy PineapplesUpdateJuly 30, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Hackers actively exploited important RCE in WordPress Alone theme
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Hackers actively exploited important RCE in WordPress Alone theme

    Actor is actively exploiting the WordPress theme ‘Alone’ to achieve a remote code execution and acquire a full site.

    Wordfense is reporting malicious activity, saying that it has blocked more than 120,000 exploitation efforts to target its customers.

    WordPress Security Firm also reports that the attacks began several days before the public disclosure of the attack defect, indicating that the actor of the danger is monitoring Changelogs and Patch to search for trivials before the website is sent an alert.

    The vulnerability tracked under the CVE-2025-5394 affects all versions up to 7.8.3 alone. The seller, Bearsthemes, fixed it alone in version 7.8.5, released on 16 June, 2025.

    The problem stems from the theme ‘alone_mport_pack_install_plugin ()’ function, which lacks non -checked and is exposed through WP_ajax_nopriv_ hook.

    The function allows plugin installation through AJAX, and a distant source in post data admits the URL, allowing uncontrolled users to trigger plugin installation from distance URL.

    According to Wordfense, the attackers take advantage of the defect for uploading the webshal inside the zip archives, deploy the password-protected PHP backdoor that allow constant remote command execution through HTTP requests, or make hidden administrator users.

    In some cases, the attackers also install a full-convenient file manager that gives them complete control over the database of the site.

    Given the above, signs of compromise include the presence of new administrator users, suspected zip/plugin folders, and ‘administrator- Ajax.php? Action = Request of ‘alone_Mport_Pack_Install_Plign’. ,

    Wordfhens made thousands of exploitation efforts from IP address to 193.84.71.244, 87.120.92.24, 146.19.213.18, and 2A0B: 4141: 820: 820: 752 :: 2, so they must be blocked immediately.

    Quantity of exploitation efforts against sites
    Quantity of exploitation efforts against sites
    Source: Wordfense

    Is almost a premium theme alone 10,000 sales on Envato marketMainly used by non-profit such as charity, NGOs, money raising organizations and social organizations.

    Although WordFense presented a report to Bearsthemes in early May 30, 2025, he did not hear back, he carried forward the issue for the Envato team on 12 June.

    Four days later, the seller released a certain version of the V7.8.5 alone, which is the recommended update target for all users.

    Last month, another premium WordPress theme, motors were targeted by hackers, who exploited a user verification defect to hijack the administrator’s accounts on weak websites.


    Knowledgeable

    Include emerging hazards in real time – before they affect your business.

    Learn how cloud detection and response (CDR) gives security teams the required edge in this practical, no-nonsense guide.

    actively exploited hackers important RCE theme WordPress
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleFed rate decision will determine the direction of BTC price
    Next Article Sweeping changes, protein coming into cold foam starbucks: CEO
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Gemini adds powerful new deep think models – what it does and who can try it

    August 4, 2025
    Security

    CTM360 Spot malicious ‘clicktok’ campaign targets Tiktok Shop users

    August 4, 2025
    Security

    How to infiltrate Linux system without leaving a trace

    August 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Bitcoin price target $ 116,000 matches the major liquidity wall

    August 4, 2025

    5 of my favorite Linux System – Monitoring Tools – and why I use them

    August 4, 2025

    The best shows like ‘Wednesday’ you should watch ahead

    August 4, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.