Cyber Posture

CVE-2025-5394

Critical

Published: 15 July 2025

Published
15 July 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.1746 95.1th percentile
Risk Priority 30 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-5394 is a critical-severity Missing Authorization (CWE-862) vulnerability in Themeforest (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 4.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Remediating flaws in the vulnerable WordPress theme directly fixes the missing capability check in alone_import_pack_install_plugin(), preventing arbitrary file uploads.

prevent

Enforcing approved authorizations prevents unauthenticated attackers from accessing the vulnerable import function to upload malicious ZIP files.

prevent

Validating ZIP file inputs rejects webshells disguised as plugins, blocking remote code execution even if access enforcement fails.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
Why these techniques?

Arbitrary file upload vuln in public-facing WordPress theme directly enables unauthenticated upload of webshell ZIPs (T1190) for RCE via installed web shell (T1505.003) and tool transfer (T1105).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Alone – Charity Multipurpose Non-profit WordPress Theme theme for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the alone_import_pack_install_plugin() function in all versions up to, and including, 7.8.3. This makes it possible for…

more

unauthenticated attackers to upload zip files containing webshells disguised as plugins from remote locations to achieve remote code execution. CVE-2025-54019 is likely a duplicate of this.

Deeper analysisAI

CVE-2025-5394 is an arbitrary file upload vulnerability in the Alone – Charity Multipurpose Non-profit WordPress Theme for WordPress, affecting all versions up to and including 7.8.3. The flaw arises from a missing capability check in the alone_import_pack_install_plugin() function, mapped to CWE-862 (Missing Authorization). It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-07-15T04:15:55.200. CVE-2025-54019 is likely a duplicate of this issue.

Unauthenticated attackers can exploit the vulnerability over the network with low complexity and no user interaction required. By uploading ZIP files containing webshells disguised as plugins from remote locations, they can achieve remote code execution on the affected WordPress site.

Advisories, including Wordfence's threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/86f91589-b309-49aa-8b04-ca972acaf8fb?source=cve and the theme's page on ThemeForest at https://themeforest.net/item/alone-charity-multipurpose-nonprofit-wordpress-theme/15019939, provide further details on the issue.

Details

CWE(s)

Affected Products

Themeforest
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-10690Shared CWE-862
CVE-2026-5464Shared CWE-862
CVE-2025-1307Shared CWE-862
CVE-2026-1720Shared CWE-862
CVE-2025-8418Shared CWE-862
CVE-2026-5294Shared CWE-862
CVE-2025-12975Shared CWE-862
CVE-2026-25242Shared CWE-862
CVE-2026-4326Shared CWE-862
CVE-2026-40189Shared CWE-862

References