Critical CVE-2025-5394 Exploit Hits WordPress ‘Alone’ Theme, Over 120,000 Attack Attempts Blocked

Critical CVE-2025-5394 Exploit Hits WordPress ‘Alone’ Theme, Over 120,000 Attack Attempts Blocked

Threat actors are actively exploiting a severe security vulnerability in the popular WordPress theme “Alone – Charity Multipurpose Non-profit”, potentially enabling complete control over affected websites. Tracked as CVE-2025-5394 and assigned a CVSS severity score of 9.8, this flaw has raised serious alarms within the WordPress community.

The vulnerability was identified and responsibly disclosed by security researcher Thái An, with detailed analysis provided by Wordfence, a leading WordPress security firm. The issue affects all versions of the theme up to and including 7.8.3, and was patched in version 7.8.5, released on June 16, 2025.

At the heart of the flaw is a function called alone_import_pack_install_plugin(), which lacks proper capability checks. This omission allows unauthenticated users to install plugins remotely via AJAX, leading to arbitrary file uploads and remote code execution.

“This vulnerability makes it possible for an unauthenticated attacker to upload arbitrary files to a vulnerable site and achieve remote code execution, which is typically leveraged for a complete site takeover,” said Wordfence’s István Márton.

Exploitation of the flaw reportedly began as early as July 12, even before the vulnerability was made public, suggesting attackers were monitoring recent code changes for security loopholes. Wordfence has already blocked over 120,900 attack attempts, with malicious activity traced to several IP addresses including:

193.84.71.244

87.120.92.24

146.19.213.18

185.159.158.108

188.215.235.94

146.70.10.25

74.118.126.111

62.133.47.18

198.145.157.102

2a0b:4141:820:752::2

In the observed campaigns, attackers typically upload a ZIP archive—such as “wp-classic-editor.zip” or “background-image-cropper.zip”—containing PHP-based backdoors. These allow remote command execution, further file uploads, and creation of unauthorized administrator accounts, often using embedded file managers.

To reduce risk, WordPress administrators using the Alone theme should update immediately to version 7.8.5 or later. Site owners are also urged to check for unknown admin users, scan for suspicious files, and monitor access to /wp-admin/admin-ajax.php?action=alone_import_pack_install_plugin in their logs.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch