Recently, a critical vulnerability was revealed in the Alone – Charity Multipurpose Non-profit WordPress theme. Known as CVE-2025-5394, it allows unauthenticated attackers to upload ZIP files disguised as plugins and install custom webshells or backdoors, achieving remote code execution (RCE) and full site control.
Wordfence reported blocking over 120,000 exploitation attempts targeting vulnerable sites.
The issue lies in the alone_import_pack_install_plugin() function, which lacks permission checks (nonce and roles) and is exposed via the wp_ajax_nopriv_ hook, allowing unauthenticated frontend requests.
Attackers can send a ZIP file containing a malicious plugin to the vulnerable endpoint. Inside, a hidden webshell or backdoor can be triggered via a browser or HTTP request.
With this webshell, attackers can execute arbitrary commands on your server, create hidden admin users, install file managers, or steal the database. They may also maintain persistent access using HTTP automation.
Volume of exploitation attempts directed at sites powered by Alone (Source: Wordfence)
If you don’t update:
You might be interested in reading: Mexico Leads Cyberattacks in the Financial Sector in Latin America
Vulnerability |
Affected Element |
Attack Type |
Scope |
Current Risk |
CVE‑2025‑5394 Alone |
Alone Theme ≤ 7.8.3 |
RCE via Arbitrary Upload |
Full site control |
Active |
CVE‑2024‑25600 Bricks |
Bricks Theme ≤ 1.9.6 |
Unauthenticated RCE |
Tens of thousands of sites |
Exploited |
CVE‑2025‑4322 Motors |
Motors Theme ≤ 5.6.67 |
Privilege Escalation |
Admin control |
Active |
CVE‑2024‑12365 W3 Total Cache |
W3TC Plugin ≤ 2.8.2 |
SSRF / Info Leak |
Millions of sites |
Reported |
These vulnerabilities reveal a pattern: popular unpatched themes or plugins are being reused by attackers to gain full access to WordPress sites.
Learn more: Adidas Confirms Data Breach Following Cyberattack
Upgrade Alone to version 7.8.5 or higher. If you can’t update right away, temporarily block the vulnerable functionality with a WAF or IDS.
Look for suspicious activity:
If compromise is suspected, change WordPress admin, FTP, hosting, and database passwords.
If backdoors or hidden admins are found, restore from a clean backup predating the attack. Disable and inspect all suspicious files.
Enable security alerts with plugins like Wordfence or Sucuri to detect unusual uploads or login attempts.
The CVE-2025-5394 flaw in the Alone theme is not a theoretical risk — it’s a real, actively exploited threat capable of giving attackers full control of your WordPress site.
At TecnetOne, we strongly recommend acting immediately: apply the update, review your installation, and strengthen your defenses. If you need technical support, monitoring, or a security audit, TecnetOne is ready to help with tailored solutions for your environment.