Recently, a critical vulnerability was revealed in the Alone – Charity Multipurpose Non-profit WordPress theme. Known as CVE-2025-5394, it allows unauthenticated attackers to upload ZIP files disguised as plugins and install custom webshells or backdoors, achieving remote code execution (RCE) and full site control.
Wordfence reported blocking over 120,000 exploitation attempts targeting vulnerable sites.
How Does the Vulnerability Work?
Flaw in the AJAX Function
The issue lies in the alone_import_pack_install_plugin() function, which lacks permission checks (nonce and roles) and is exposed via the wp_ajax_nopriv_ hook, allowing unauthenticated frontend requests.
Arbitrary File Upload
Attackers can send a ZIP file containing a malicious plugin to the vulnerable endpoint. Inside, a hidden webshell or backdoor can be triggered via a browser or HTTP request.
Remote Code Execution
With this webshell, attackers can execute arbitrary commands on your server, create hidden admin users, install file managers, or steal the database. They may also maintain persistent access using HTTP automation.
Who Is Affected?
- All versions up to Alone 7.8.3 are vulnerable.
- Update 7.8.5, released June 16, 2025, patches the flaw.
- The theme has nearly 10,000 sales, mainly in nonprofits, NGOs, and foundations.
Volume of exploitation attempts directed at sites powered by Alone (Source: Wordfence)
Real Risks for You and Your Organization
If you don’t update:
- Attackers could gain full control of your website.
- Sensitive data (clients, donations, credentials) could be exfiltrated.
- Hidden admin accounts could be created to run fraudulent campaigns.
- Your reputation and operations could be severely compromised.
You might be interested in reading: Mexico Leads Cyberattacks in the Financial Sector in Latin America
Why Is It Being Actively Exploited Now?
- Wordfence detected exploitation attempts before public disclosure, suggesting attackers monitor repository changes and launch exploits immediately.
- Over 120,000 attempts have been blocked in recent days.
Quick Comparison: Alone vs. Other WordPress Flaws
Vulnerability |
Affected Element |
Attack Type |
Scope |
Current Risk |
CVE‑2025‑5394 Alone |
Alone Theme ≤ 7.8.3 |
RCE via Arbitrary Upload |
Full site control |
Active |
CVE‑2024‑25600 Bricks |
Bricks Theme ≤ 1.9.6 |
Unauthenticated RCE |
Tens of thousands of sites |
Exploited |
CVE‑2025‑4322 Motors |
Motors Theme ≤ 5.6.67 |
Privilege Escalation |
Admin control |
Active |
CVE‑2024‑12365 W3 Total Cache |
W3TC Plugin ≤ 2.8.2 |
SSRF / Info Leak |
Millions of sites |
Reported |
These vulnerabilities reveal a pattern: popular unpatched themes or plugins are being reused by attackers to gain full access to WordPress sites.
Learn more: Adidas Confirms Data Breach Following Cyberattack
Step-by-Step Protection
Update Immediately
Upgrade Alone to version 7.8.5 or higher. If you can’t update right away, temporarily block the vulnerable functionality with a WAF or IDS.
Review Logs and Symptoms
Look for suspicious activity:
- Requests to admin-ajax.php?action=alone_import_pack_install_plugin
- New ZIP/plugin uploads
- Unknown admin accounts created
Change Credentials
If compromise is suspected, change WordPress admin, FTP, hosting, and database passwords.
Restore and Clean
If backdoors or hidden admins are found, restore from a clean backup predating the attack. Disable and inspect all suspicious files.
Strengthen Overall Security
- Keep WordPress, themes, and plugins updated.
- Enable two-factor authentication for critical logins.
- Apply least privilege policies for user and FTP accounts.
Continuous Monitoring
Enable security alerts with plugins like Wordfence or Sucuri to detect unusual uploads or login attempts.
Essential Checklist
- Update Alone to v7.8.5+
- Temporarily block requests to the vulnerable endpoint
- Review logs and admin activity
- Change key credentials
- Scan with security tools
- Apply least privilege and access restrictions
Why You Must Act Now
- This vulnerability is being actively exploited with thousands of daily attempts.
- WordPress powers a large share of the digital presence for businesses and nonprofits: a flaw like this can cripple your site or expose critical data.
- Reading or waiting is not enough — you must act now to prevent compromise.
Conclusion
The CVE-2025-5394 flaw in the Alone theme is not a theoretical risk — it’s a real, actively exploited threat capable of giving attackers full control of your WordPress site.
At TecnetOne, we strongly recommend acting immediately: apply the update, review your installation, and strengthen your defenses. If you need technical support, monitoring, or a security audit, TecnetOne is ready to help with tailored solutions for your environment.