CVE-2025-10690
Published: 19 September 2025
Summary
CVE-2025-10690 is a critical-severity Missing Authorization (CWE-862) vulnerability in Themeforest (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 30.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of the specific flaw in the theme's 'beplus_import_pack_install_plugin' function to eliminate unauthorized file uploads.
Mandates enforcement of capability checks and access controls on plugin import functions to block unauthenticated arbitrary file uploads.
Deploys mechanisms to scan and eradicate webshells disguised as plugins uploaded through the vulnerable function.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authorization on plugin import function enables unauthenticated remote arbitrary file upload of webshell zips on public-facing WordPress site, directly facilitating web shell installation and RCE.
NVD Description
The Goza - Nonprofit Charity WordPress Theme theme for WordPress is vulnerable to unauthorized arbitrary file uploads due to a missing capability check on the 'beplus_import_pack_install_plugin' function in all versions up to, and including, 3.2.2. This makes it possible for…
more
unauthenticated attackers to upload zip files containing webshells disguised as plugins from remote locations to achieve remote code execution.
Deeper analysisAI
CVE-2025-10690 is a critical vulnerability in the Goza - Nonprofit Charity WordPress Theme for WordPress, affecting all versions up to and including 3.2.2. It stems from a missing capability check on the 'beplus_import_pack_install_plugin' function, enabling unauthorized arbitrary file uploads. Published on 2025-09-19, the flaw carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is classified under CWE-862 (Missing Authorization).
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required. By uploading zip files containing webshells disguised as plugins from remote locations, they can achieve remote code execution on the targeted WordPress site.
Advisories and further details are available from sources including Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/628bfa19-2ffa-426b-8b88-22a0c4d0ba92?source=cve and the theme's page on ThemeForest at https://themeforest.net/item/goza-nonprofit-charity-wordpress-theme/23781575. Security practitioners should consult these for recommended mitigations, such as restricting access to the affected function or monitoring for suspicious plugin imports.
Details
- CWE(s)