Skip to content

Penetration Testing Tools

  • Home
  • Google
    • Android
  • Information Security
    • Cyber Security
    • Cybercriminals
    • Data Leak
    • Malware
    • Vulnerability
  • Linux
  • Microsoft
    • Windows
  • Open Source Tool
  • Technology
  • Home
  • Google
    • Android
  • Information Security
    • Cyber Security
    • Cybercriminals
    • Data Leak
    • Malware
    • Vulnerability
  • Linux
  • Microsoft
    • Windows
  • Open Source Tool
  • Technology

Penetration Testing Tools

  • Vulnerability

WordPress “Motors” Theme Critical Flaw (CVE-2025-4322, CVSS 9.8): Unauthenticated Account Takeover & Mass Exploitation Underway

by ddos · June 24, 2025

A critical vulnerability discovered in the WordPress visual theme “Motors” has enabled hackers to seize administrative privileges en masse, granting them full control over compromised websites. Identified as CVE-2025-4322, the flaw represents a privilege escalation issue and was uncovered on May 2, 2025. The security team at Wordfence conducted the investigation and issued a public advisory on May 19, urging users to apply the patch without delay.

“Motors” is a commercial WordPress template developed by StylemixThemes. In WordPress terminology, a “theme” defines the site’s visual design, user interface layout, and display format, often incorporating additional functionality. Widely adopted among automotive-related platforms—from dealership websites to vehicle marketplaces—Motors has been downloaded more than 22,460 times via the EnvatoMarket marketplace.

The vulnerability affects all versions up to and including 5.6.68. A patch was released on May 14; however, many administrators had yet to update, and by May 20—just a day after public disclosure—exploitation attempts had already begun. As of June 7, Wordfence had recorded over 23,100 instances of active exploitation.

The root of the issue lies within the built-in “Login Register” widget, which manages authentication, registration, and password recovery. The vulnerability stems specifically from flawed logic in the password reset mechanism.

The attack begins with the identification of an active path to the login form—typically URLs such as /login-register, /account, /reset-password, or /signin. The attacker then initiates a series of POST requests containing deliberately malformed data, continuing until the server confirms the presence of the target endpoint.

Within the body of a successful request, a malicious value is passed to the ‘hash_check’ parameter, encoded with invalid UTF-8 characters. This triggers a failure in the hash validation process, mistakenly marking the request as legitimate and permitting a password reset.

The attacker then injects a new password into the ‘stm_new_password’ parameter and designates a user ID—commonly ID=1, corresponding to the original administrator account.

As a result, the hacker overrides the admin password, gains access to the site’s backend, and can create additional privileged accounts to maintain control.

Wordfence warns that telltale signs of compromise include unexpected lockouts of existing admin credentials and the appearance of unfamiliar accounts with elevated privileges—clear indicators of CVE-2025-4322 exploitation.

The report also lists IP addresses associated with the attacks, recommending that site owners temporarily block these sources at the web server level to mitigate automated intrusion attempts.

Researchers have identified specific credentials used by attackers during password injection:

  • Testtest123!@#
  • rzkkd$SP3znjrn
  • Kurd@Kurd12123
  • owm9cpXHAZTk
  • db250WJUNEiG

The presence of any of these passwords in logs or the admin panel should prompt an immediate and thorough security review. All users of the Motors theme are strongly advised to update to version 5.6.68 without delay, audit the list of administrator accounts, and scrutinize activity logs for any signs of irregular behavior.

Share

Tags: Account TakeoverCVE-2025-4322cybersecurityMotors ThemePatch Nowprivilege escalationvulnerabilityweb securityWordfenceWordPress

Follow:

  • Next story Cloudflare Mitigates Record 7.3 Tbps DDoS Attack: Largest Ever Recorded
  • Previous story Russian APT UNC6293 Exploits Google App Passwords to Bypass 2FA, Hacks Prominent Critics

Search

MAKE THE WEBSITE ONLINE

  • Popular Posts
  • Tags
  • Web Application Firewall, AI Security

    Open Source Tool

    UUSEC WAF: Free, Industrial-Grade Web Application Firewall with AI & Three-Layer Defense

    June 24, 2025

  • PPL bypass

    Open Source Tool

    ComDotNetExploit: PoC for Windows PPL Bypass via COM-to-.NET

    May 25, 2025

  • anti-forensic

    Open Source Tool

    ulexecve: Execute dynamic or statically compiled ELF Linux binaries without ever calling execve()

    May 26, 2025

  • RouterOS Security

    Open Source Tool

    Sara: RouterOS Security Inspector

    May 26, 2025

  • Kubernetes Security Platform

    Open Source Tool

    StackRox Kubernetes Security Platform

    May 27, 2025

  • Amazon AMD Android Apple ARM Artificial intelligence Asus ChatGPT chrome cybersecurity Dell facebook Firefox Github google Google Chrome Huawei India Intel Lenovo LG Linux Linux Kernel MediaTek Meta Micron Microsoft microsoft edge MSI Nvidia OpenAI python Qualcomm ransomware Samsung SK Hynix Sony TSMC ubuntu windows Windows 7 Windows 10 Windows 10X Windows 11 Xbox




Reward

Brilliantly

SAFE!

meterpreter.org

Content & Links

Verified by Sur.ly

2022

  • Home
  • About Us
  • Contact Us
  • DMCA NOTICE
  • Privacy Policy

Penetration Testing Tools © 2025. All Rights Reserved.