Original Article Text

Click to Toggle View

WordPress Motors theme flaw mass-exploited to hijack admin accounts. Hackers are exploiting a critical privilege escalation vulnerability in the WordPress theme "Motors" to hijack administrator accounts and gain complete control of a targeted site. The malicious activity was spotted by Wordfence, which had warned last month about the severity of the flaw, tracked under CVE-2025-4322, urging users to upgrade immediately. Motors, developed by StylemixThemes, is a WordPress theme popular among automotive-related websites. It has 22,460 sales on the EnvatoMarket and is backed by an active community of users. The privilege escalation vulnerability was discovered on May 2, 2025, and first reported by Wordfence on May 19, impacting all versions before and including 5.6.67. The flaw arises from an improper user identity validation during password updating, allowing unauthenticated attackers to change administrator passwords at will. StylemixThemes released Motors version 5.6.68, which addresses CVE-2025-4322, on May 14, 2025, but many users failed to apply the update by Wordfence's disclosure and got exposed to elevated exploitation risk. As Wordfence confirms in a new writeup, the attacks began on May 20, only a day after they publicly disclosed the details. Wide-scale attacks were observed by June 7, 2025, with Wordfence reporting blocking 23,100 attempts against its customers. Attack process and signs of breach The vulnerability is in the Motors theme's "Login Register" widget, including password recovery functionality. The attacker first locates the URL where this widget is placed by probing /login-register, /account, /reset-password, /signin, etc., with specially crafted POST requests until they get a hit. The request contains invalid UTF-8 characters in a malicious 'hash_check' value, causing the hash comparison in the password reset logic to succeed incorrectly. The POST body contains a 'stm_new_password' value that resets the user password, targeting user IDs that typically correspond to administrator users. Attacker-set passwords observed in the attacks so far include:  Once access is gained, the attackers log into the WordPress dashboard as administrators and create new admin accounts for persistence. The sudden appearance of such accounts combined with existing administrators being locked out (passwords no longer working) are signs of CVE-2025-4322 exploitation. Wordfence has also listed several IP addresses that launch these attacks in the report, which WordPress site owners are recommended to put on their block list. Why IT teams are ditching manual patch management Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore. In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work -- no complex scripts required.

Daily Brief Summary

CYBERCRIME // Hackers Exploit WordPress Theme Flaw to Gain Admin Control

Hackers are actively exploiting a critical vulnerability in the "Motors" WordPress theme to hijack admin accounts.

The vulnerability, identified as CVE-2025-4322, allows attackers to escalate privileges by altering admin passwords without authorization.

Wordfence first reported the issue on May 19, 2025, after discovering the flaw earlier in the month, with exploits seen from May 20.

Despite a patch released on May 14, many users did not update, leading to widespread exploitation, with over 23,100 attacks blocked by Wordfence by early June.

Attackers manipulate the theme's password reset feature using malformed data to bypass security checks and reset admin passwords.

Post-intrusion activities include creating new admin accounts for persistent access and potential lockout of legitimate administrators.

Observations note the use of specific malicious IP addresses, which Wordfence recommends blocking to mitigate risk.

The incident underscores the critical importance of timely application of security patches to prevent unauthorized access and control.