Cyber Posture

CVE-2025-10690

Critical

Published: 19 September 2025

Published
19 September 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0061 69.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-10690 is a critical-severity Missing Authorization (CWE-862) vulnerability in Themeforest (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 30.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely remediation of the specific flaw in the theme's 'beplus_import_pack_install_plugin' function to eliminate unauthorized file uploads.

prevent

Mandates enforcement of capability checks and access controls on plugin import functions to block unauthenticated arbitrary file uploads.

preventdetect

Deploys mechanisms to scan and eradicate webshells disguised as plugins uploaded through the vulnerable function.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
Why these techniques?

Missing authorization on plugin import function enables unauthenticated remote arbitrary file upload of webshell zips on public-facing WordPress site, directly facilitating web shell installation and RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Goza - Nonprofit Charity WordPress Theme theme for WordPress is vulnerable to unauthorized arbitrary file uploads due to a missing capability check on the 'beplus_import_pack_install_plugin' function in all versions up to, and including, 3.2.2. This makes it possible for…

more

unauthenticated attackers to upload zip files containing webshells disguised as plugins from remote locations to achieve remote code execution.

Deeper analysisAI

CVE-2025-10690 is a critical vulnerability in the Goza - Nonprofit Charity WordPress Theme for WordPress, affecting all versions up to and including 3.2.2. It stems from a missing capability check on the 'beplus_import_pack_install_plugin' function, enabling unauthorized arbitrary file uploads. Published on 2025-09-19, the flaw carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is classified under CWE-862 (Missing Authorization).

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required. By uploading zip files containing webshells disguised as plugins from remote locations, they can achieve remote code execution on the targeted WordPress site.

Advisories and further details are available from sources including Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/628bfa19-2ffa-426b-8b88-22a0c4d0ba92?source=cve and the theme's page on ThemeForest at https://themeforest.net/item/goza-nonprofit-charity-wordpress-theme/23781575. Security practitioners should consult these for recommended mitigations, such as restricting access to the affected function or monitoring for suspicious plugin imports.

Details

CWE(s)

Affected Products

Themeforest
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-5464Shared CWE-862
CVE-2025-5394Shared CWE-862
CVE-2025-1307Shared CWE-862
CVE-2026-1720Shared CWE-862
CVE-2025-8418Shared CWE-862
CVE-2026-5294Shared CWE-862
CVE-2025-12975Shared CWE-862
CVE-2026-25242Shared CWE-862
CVE-2026-4326Shared CWE-862
CVE-2026-40189Shared CWE-862

References