“The downloaded file is copied to the WordPress uploads folder, which is publicly accessible by default… attackers can combine the two vulnerabilities to upload arbitrary malicious PHP code and then access the file to trigger remote code execution,” warns the Wordfence report. “We urge users to update their sites with the latest patched version of TheGem, version 5.10.3.1 at the time of this writing, as soon as possible,” advised the Wordfence security team. This code snippet from TheGem theme blindly downloads files without verification, creating an entry point for attackers to upload malicious PHP files. This vulnerability allows authenticated users with subscriber-level permissions to modify theme settings, including setting the logo URL to point to malicious content. As WordPress powers approximately 43% of all websites globally, vulnerabilities in popular themes like TheGem represent significant security risks with potential widespread impact. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. This vulnerability allows authenticated attackers with subscriber-level access to upload potentially malicious files to affected servers. This incident serves as a stark reminder of the importance of regular software updates, vigilant user permission management, and the implementation of robust security measures such as web application firewalls.
This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 14 May 2025 07:45:14 +0000