![]() |
<div id="post_message_798822">
Hackers are exploiting a critical privilege escalation vulnerability in the WordPress theme "Motors" to hijack administrator accounts and gain complete control of a targeted site.<br/> <br/> The malicious activity was spotted by Wordfence, which had warned last month about the severity of the flaw, tracked under CVE-2025-4322, urging users to upgrade immediately.<br/> <br/> Motors, developed by StylemixThemes, is a WordPress theme popular among automotive-related websites. It has 22,460 sales on the <a href="https://themeforest.net/item/motors-automotive-cars-vehicle-boat-dealership-classifieds-wordpress-theme/13987211" target="_blank">EnvatoMarket </a>and is backed by an active community of users.<br/> <br/> The privilege escalation vulnerability was discovered on May 2, 2025, and first reported by Wordfence on May 19, impacting all versions before and including 5.6.67.<br/> <br/> The flaw arises from an improper user identity validation during password updating, allowing unauthenticated attackers to change administrator passwords at will.<br/> <br/> StylemixThemes released Motors version 5.6.68, which addresses CVE-2025-4322, on May 14, 2025, but many users failed to apply the update by Wordfence's disclosure and got exposed to elevated exploitation risk.<br/> <br/> As Wordfence <a href="https://www.wordfence.com/blog/2025/06/attackers-actively-exploiting-critical-vulnerability-in-motors-theme/" target="_blank">confirms in a new writeup</a>, the attacks began on May 20, only a day after they publicly disclosed the details. Wide-scale attacks were observed by June 7, 2025, with Wordfence reporting blocking 23,100 attempts against its customers.<br/> <br/> <img alt="" border="0" class="bbCodeImage" src="https://www.bleepstatic.com/images/news/u/1220909/2025/June/exploit-volume(1).jpg"/><br/> <div style="margin:20px; margin-top:5px; "> <!-- <div class="smallfont" style="margin-bottom:2px">Quote:</div> --> <table border="0" cellpadding="6" cellspacing="0" width="100%"> <tr> <td class="alt2" style="background: rgb(37, 37, 37) none repeat scroll 0% 0%; border: 1px solid rgb(0, 0, 0); border-radius: 5px; font-size: 11px; text-shadow: none;"> Daily attack volumes. Source: Wordfence </td> </tr> </table> </div><b><font size="4"><font color="White">Attack process and signs of breach</font></font></b><br/> <br/> The vulnerability is in the Motors theme's "Login Register" widget, including password recovery functionality.<br/> <br/> The attacker first locates the URL where this widget is placed by probing /login-register, /account, /reset-password, /signin, etc., with specially crafted POST requests until they get a hit.<br/> <br/> The request contains invalid UTF-8 characters in a malicious 'hash_check' value, causing the hash comparison in the password reset logic to succeed incorrectly.<br/> <br/> The POST body contains a 'stm_new_password' value that resets the user password, targeting user IDs that typically correspond to administrator users.<br/> <br/> <img alt="" border="0" class="bbCodeImage" src="https://www.bleepstatic.com/images/news/u/1220909/2025/June/example-requests.jpg"/><br/> <div style="margin:20px; margin-top:5px; "> <!-- <div class="smallfont" style="margin-bottom:2px">Quote:</div> --> <table border="0" cellpadding="6" cellspacing="0" width="100%"> <tr> <td class="alt2" style="background: rgb(37, 37, 37) none repeat scroll 0% 0%; border: 1px solid rgb(0, 0, 0); border-radius: 5px; font-size: 11px; text-shadow: none;"> Example requests from the attacks. Source: Wordfence </td> </tr> </table> </div>Attacker-set passwords observed in the attacks so far include: <ul><li>Testtest123!@#</li> </ul><ul><li>rzkkd$SP3znjrn</li> </ul><ul><li>Kurd@Kurd12123</li> </ul><ul><li>owm9cpXHAZTk</li> </ul><ul><li>db250WJUNEiG</li> </ul>Once access is gained, the attackers log into the WordPress dashboard as administrators and create new admin accounts for persistence.<br/> <br/> The sudden appearance of such accounts combined with existing administrators being locked out (passwords no longer working) are signs of CVE-2025-4322 exploitation.<br/> <br/> Wordfence has also listed several IP addresses that launch these attacks in the report, which WordPress site owners are recommended to put on their block list.<br/> <br/> <a href="https://www.bleepingcomputer.com/news/security/wordpress-motors-theme-flaw-mass-exploited-to-hijack-admin-accounts/" target="_blank">@ BleepingComputer </a> </div> |
All times are GMT. The time now is 02:44 AM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.