Attackers are actively exploiting a critical privilege escalation vulnerability in the WordPress Motors theme, allowing them to hijack administrator accounts and take complete control of the target site.
The malicious activity was discovered by Wordfence, which last month reported a critical vulnerability, theCVE-2025-4322, which affects all versions of the Motors theme up to 5.6.67. This theme, developed by StylemixThemes, has 22,460 sales on Envato Market and is very popular among owners of automotive-related websites.
The issue is related to the Login Register widget and the incorrect validation of the user’s identity when updating a password, which allows unauthenticated attackers to change administrator passwords. Therefore, to exploit the bug, an attacker must first find the URL where the widget is located by checking /login-register, /account, /reset-password, /signin, etc. using special POST requests. Such requests contain invalid UTF-8 characters in the hash_check value, which leads to incorrect hash comparisons when resetting a password.
Advertising
The POST body contains the stm_new_password value, which resets the user’s password based on IDs that typically belong to site administrators.
In May, StylemixThemes developers released version 5.6.68, which fixed CVE-2025-4322, but many users had not yet installed the updates and may now be vulnerable to attacks.
Wordfence analysts reported that attacks on the new vulnerability began as early as May 20, just one day after the issue was disclosed. More extensive attacks began after June 7, 2025, and Wordfence says it has already blocked over 23,100 hacking attempts against its customers.
According to experts, the passwords used by attackers in the attacks include:
Try test123!@#;
rzkkd$SP3znjrn;
Kurd@Kurd12123;
owm9cpXHAZTk;
Once access is gained, attackers log into the WordPress dashboard as administrators and create additional administrative accounts to gain a foothold on the hacked resource. Experts write that the sudden appearance of such accounts, combined with the locking of existing administrator accounts (passwords no longer working), is a sure sign of CVE-2025-4322 exploitation. Motors users are advised to update their theme as soon as possible.
Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.
Responsible for the RED Team of a large Telecommunications company and 4G/5G cyber security labs. He has held managerial positions ranging from ICT Risk Management to software engineering to teaching in university master's programs.
Areas of Expertise:Bug Hunting, Red Team, Cyber Intelligence & Threat Analysis, Disclosure, Cyber Warfare and Geopolitics, Ethical Hacking
Ritorna lunedì 18 e martedì 19 maggio la Red Hot Cyber Conference 2026, l’evento gratuito creato dalla community di Red Hot Cyber, che si terrà a Roma in Via Bari 18, presso il Teatro Italia. L’iniziativa è pensata per promuovere la cultura della sicurezza informatica, dell’innovazione digitale e della consapevolezza del rischio cyber. Rappresenta un punto di incontro tra professionisti, studenti, aziende e appassionati del settore, offrendo contenuti tecnici, workshop e momenti di confronto ad alto valore formativo.
L’edizione 2026 si svolgerà a Roma nelle giornate del 18 e 19 maggio presso il Teatro Italia e includerà attività formative, sessioni pratiche e la tradizionale Capture The Flag. L’evento è completamente gratuito, ma la partecipazione è subordinata a registrazione obbligatoria tramite i canali ufficiali, al fine di garantire una corretta organizzazione e gestione degli accessi.
Le iscrizioni saranno disponibili a partire dal 16 marzo 2026 attraverso la piattaforma Eventbrite, dove sarà possibile registrarsi ai diversi percorsi dell’evento: workshop, conferenza principale e competizione CTF. I link ufficiali di registrazione saranno pubblicati sui canali di Red Hot Cyber e costituiranno l’unico punto valido per la prenotazione dei posti all’evento.