Critical RCE Flaw in WordPress ‘Alone’ Theme Under Mass Exploitation

by | Jul 31, 2025 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Threat actors are actively exploiting a critical vulnerability in the WordPress theme “Alone”, enabling unauthenticated remote code execution and full site takeovers. The flaw, tracked as CVE-2025-5394, affects all theme versions up to 7.8.3.

Over 120,000 Exploitation Attempts Blocked

WordPress security firm Wordfence reports that it has already blocked over 120,000 exploitation attempts on customer sites, with attack activity starting before public disclosure of the flaw.

This indicates that attackers are actively monitoring changelogs and patch releases to identify newly introduced vulnerabilities before official security advisories are published.

Technical Details of the Vulnerability

The flaw lies in the theme’s alone_import_pack_install_plugin() function, which:

  • Is exposed via the wp_ajax_nopriv_ hook, allowing unauthenticated access
  • Lacks nonce validation, leaving it vulnerable to abuse
  • Accepts a remote plugin source via POST data, allowing attackers to install any ZIP file

The vulnerable function can be exploited by sending crafted AJAX requests to admin-ajax.php, triggering the installation of malicious plugins from remote servers.

Volume of exploitation attempts against Alone-powered sitesVolume of exploitation attempts against Alone-powered sites
Source: Wordfence

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Full Site Takeovers via Webshells and Backdoors

Attackers are using this exploit to:

  • Upload PHP webshells and password-protected backdoors
  • Maintain persistence via hidden administrator accounts
  • Deploy full-featured file managers for complete control
  • Modify or access the site database and backend

These attacks can result in total compromise of affected websites.

Indicators of Compromise

Site owners should immediately check for:

  • New unknown administrator users
  • Suspicious plugin folders or uploaded ZIP archives
  • Requests to:
    admin-ajax.php?action=alone_import_pack_install_plugin

Known malicious IP addresses involved in the attacks include:

  • 193.84.71.244
  • 87.120.92.24
  • 146.19.213.18
  • 2a0b:4141:820:752::2

Wordfence recommends blocking these IPs at the firewall or server level.




Patch Released After Delayed Vendor Response

Although Wordfence reported the issue to the theme developer Bearsthemes on May 30, 2025, no response was received. The security firm escalated the matter to Envato on June 12.

The issue was patched on June 16, with the release of Alone version 7.8.5, which is now the recommended update for all users.

Alone Theme Primarily Used by Non-Profits

The Alone theme is a premium WordPress product with nearly 10,000 sales on the Envato Market. It is popular among charities, NGOs, fundraising organizations, and other non-profits—many of whom may lack the resources for robust security monitoring.

This increases the risk of undetected compromise in vulnerable deployments.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This