Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Motors WordPress Vulnerability Exposes Sites to Takeover
News

Motors WordPress Vulnerability Exposes Sites to Takeover

Team-CWDBy Team-CWDDecember 17, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A security flaw in the Motors WordPress theme has been disclosed that could allow logged-in users with minimal privileges to gain full control of affected websites.

The issue involves an arbitrary file upload vulnerability that allows Subscribers and higher-level users to install and activate plugins, potentially enabling malicious code execution.

The Motors theme is a widely used WordPress solution for automotive websites, including car dealerships, vehicle rental platforms and classified listings.

Developed by StylemixThemes, it currently has more than 20,000 active installations.

The vulnerability affects versions 5.6.81 and below and has been assigned CVE-2025-64374.

The flaw was discovered and responsibly reported by Denver Jackson, a member of the Patchstack Alliance community. It resides in an AJAX handler that allows plugin installation through a backend function. While the function uses a nonce for request validation, it lacks a proper permission check.

Because the nonce value can be accessed by Subscriber-level users from the WordPress admin interface, any logged-in user can supply an arbitrary plugin URL. This allows malicious plugins to be uploaded and activated, ultimately leading to a full site takeover.

Patchstack noted that this reflects a broader issue seen across WordPress components. Nonces are designed to protect against request forgery, not to enforce access control.

“Nonces should never be relied on for authentication, authorization, or access control. Protect your functions using current_user_can() and always assume that nonces can be compromised,” advises the WordPress developer documentation.

Read more on WordPress theme security: Critical WordPress Plugin Bugs Exploited En Masse

The issue was fixed in Motors version 5.6.82, which introduced a current_user_can permission check. This ensures that only authorized users can trigger the plugin installation and activation process. The patch was released on 3 November, following disclosure to the vendor in September.

The advisory, published by PatchStack today, highlights several key lessons for developers and site owners:

  • Nonces alone are not sufficient to protect privileged functionality

  • All actions that modify a site should enforce strict permission checks

  • Logged-in users should never be assumed to be trustworthy by default

Site owners running the Motors theme are strongly advised to update to version 5.6.82 or later to mitigate the risk. Failing to apply the update leaves sites exposed to one of the most severe classes of WordPress vulnerabilities.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGoogle Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats
Next Article How to Streamline Zero Trust Using the Shared Signals Framework
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.