By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    What is a rootkit and how to remove it
    1 year ago
    The Mask – Unveiling the World’s Most Sophisticated APT Campaign
    1 year ago
    Regin APT Attacks Among the Most Sophisticated Ever Analyzed
    1 year ago
    Latest News
    How To Disable PHP Execution and Directory Browsing?
    15 hours ago
    Patchstack Becomes Member Of Open Source Security Foundation
    2 days ago
    PDF Phishing: Beyond the Bait
    2 days ago
    Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
    2 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    For 0-day vulnerabilities in Windows, temporary patches
    1 year ago
    Windows 11 22H2 (build 22621.317) outs in the Release Preview Channel
    1 year ago
    How to avoid problems installing Windows 11 22H2
    1 year ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    10 months ago
    Now you can speed up any video in your browser
    10 months ago
    How to restore access to a file after EFS or view it on another computer?
    10 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    11 months ago
  • How To
    How ToShow More
    Latest copyright decision in Germany rejects blocking through global DNS resolvers
    Latest copyright decision in Germany rejects blocking through global DNS resolvers
    22 hours ago
    Restricted Settings in Android 13 and 14
    22 hours ago
    A year in recap: Windows accessibility
    2 days ago
    How to stop, disable, and remove any Android apps — even system ones
    4 days ago
    Bigger, Better, Cooler in a 2U1N form factor
    Bigger, Better, Cooler in a 2U1N form factor
    5 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    How to remove a site from suggestions in Chrome?
    1 year ago
    How to create your own map in Google Maps?
    1 year ago
    Checking the uniqueness of the logo
    1 year ago
    Latest News
    How to check CPU temp on Windows 11
    1 day ago
    How to disable news feed from Widgets on Windows 11
    2 days ago
    How to fix performance issues after upgrading to Windows 11 23H2
    2 days ago
    How to disable updates on Windows 10 Pro and Home
    3 days ago
  • Glossary
  • My Bookmarks
Reading: When Your Premium WordPress Theme Is More Than You Bargained For
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Wordpress Threats

When Your Premium WordPress Theme Is More Than You Bargained For

Vitus White
Last updated: 7 October
Vitus White 2 months ago
Share
13 Min Read

UPDATE: We want to thank ThemeForest for reacting swiftly to our report, and for removing the vulnerable premium theme mentioned here from their marketplace.

Recently a friend of mine asked me to set up a WordPress site for her using a premium WordPress theme she had bought – I quickly found the theme came with some severe security issues right out of the box.

Contents
Background: the problematic practice of bundling plugins with themesThe Great Revolution Slider Hack of 2014Case study: How to get hacked out of the boxHow to prevent cases like this one?The lack of visibility into premium plugins

Using that example, this article will dive into the risk of pre-made bundled themes. Such themes may hide serious security vulnerabilities within them that won’t be obvious to the casual user.

Many people who want to build a website, but are not developers or designers look into pre-made themes, which are being sold in different marketplaces. Such themes are often very specifically designed for a single purpose, such as a design for a bakery, festival, news site, etc. They require only the basic setup and copy changes to get a live page going.

Unfortunately, these pre-made themes often come with a hidden risk. Given that the customers of such pre-made themes are less technical than the average WordPress user, it’s safe to assume the majority of them are not aware of any risk at all.

We’ll dive into the case study in a bit, but first, some context.

Background: the problematic practice of bundling plugins with themes

This problem has existed in the WordPress ecosystem since the concept of premium themes was born. Back in the day, WordPress themes were a big business – you didn’t have drag-and-drop page builders (like Elementor) that make it easy to put together a well-designed website.

Back then, you either had to dive into HTML/CSS and build your own theme, or you purchased a theme from someone who knew how to build one. Buying a pre-made theme was considered the cheapest option to get a site running.

Exactly like you would install plugins today to add forms or incorporate a fancy slider – the developers back then also used different plugins to complete the design and functionality of the theme they were selling.

The Great Revolution Slider Hack of 2014

Most of the themes come with additional functionality that completes the design. A good example of a design functionality is slider plugins (e.g. Revolution Slider) – but you also need other functionality such as forms, SEO performance modifications, and so on.

Many premium themes relied (and still do) on a plugin called Revolution Slider (A.K.A. RevSlider) which gives a lot of cool functionality to help design the main hero slider element for your website.

In 2014, hackers found a LFI (local file inclusion) vulnerability in the Revolution Slider plugin, which allowed any un-authenticated user to download the site’s wp-config.php file, which was then used to exploit a second vulnerability in the Revolution Slider plugin to upload a backdoor to gain full control over the website.

This resulted in a mass-exploitation campaign, where hackers automated attacks against every website they found online (regardless if they used Revolution Slider or not) to gain backdoor access to as many websites possible.

Even though it was impossible to get a clear picture of how many websites had the Revolution Slider plugin installed, the security community quickly realized the scale of the issue by looking at the premium themes being sold where Revolution Slider was being preinstalled.

Hundreds of thousands of websites were hacked, and Envato eventually made a statement confirming over 1,000 premium themes had Revolution Slider bundled in. Since the incident, Envato has also improved its guidelines which now prohibit theme developers from bundling plugins.

Case study: How to get hacked out of the box

This entire article was inspired by a personal experience that happened in early September 2023. A friend who was about to set up a WordPress site had chosen a theme that was purpose-built for an event she was hosting.

I was asked to help set up the WordPress site and install the premium theme that had already been purchased. The theme itself looked very promising and was even marked as “recently updated” in ThemeForest.

After installing the theme .zip file I was presented with an error, asking me to install the required plugins. Like so:

The theme installation process sent me to an “Install Required Plugins” page, where you need to install the plugins that are required for the theme to work. It asked me to install 8 plugins in total – 4 from the official WordPress.org plugin repository, and the other 4 were pre-packaged.

After all of the required plugins were activated, I connected the website to Patchstack to check the brand new site for security issues

Lo and behold, here’s what Patchstack reported back:

Out of the box, the website came with 5 different security vulnerabilities – 3 of which were high-priority issues and one of them is even known to be actively mass-exploited.

As seen in the screenshot above, the most critical vulnerability that is marked as actively mass-exploited did have a fixed version available. So I checked if I could update the plugins:

Interestingly, there was only one update available. But for the starters, I installed that to check if that fixed any of the vulnerabilities – it did some.

As for the other plugins, it looked like everything was up-to-date.

Yet, we were still left with 3 other vulnerabilities, including the mass-exploited one.

And this here is a perfect example of one of the biggest security risks in WordPress – a false sense of security from seemingly up-to-date plugins, that in reality may contain unpatched issues.

If you’re looking at your admin panel it would appear that your site is nicely up-to-date. Instead, a site in this state would probably be hacked within a week.

On my friend’s site, there was nothing I could do with the Cross Site Scripting vulnerability in the Cost Calculator Plugin. Of course, Patchstack had automatically applied a virtual patch on it so it couldn’t be exploited, but there was no other way to solve the issue as the plugin had never released a fix for it. In fact, the plugin had even been removed from the WordPress.org plugin repository since January 2023.

The only option we had here was to delete the plugin and hope that the theme would keep working (even with Patchstack’s protection, it’s just a bad security practice to leave vulnerable plugins running on your site!)

Now, to the most serious security issue, which was the Elementor Pro broken access control vulnerability – the one known to be actively mass-exploited. This vulnerability itself was actually fixed by the Elementor team quite a while ago (as was the other remaining vulnerability).

However, the theme was using a very old version of Elementor Pro, and since it didn’t come with the actual licence there was no possibility to download a newer, safer version!

The only option was to either delete the Elementor Pro plugin or spend additional money and purchase the Elementor Pro license.

The theme developer did offer a free license to Elementor Pro, but he also stated that “Elementor PRO it is not mandatory for use the theme that you have purchased and you are free to not request it”. So probably most of the customers who have purchased this theme never bothered with the license. Especially because to get it, the theme designer asked for your WordPress admin panel username and password – which you should never share with someone else!

In the end, I purchased the Elementor Pro license for the friend, and we were able to get rid all of the vulnerabilities on the site – but I doubt this is the case with the majority of the customers (over 2,500 of them) who also bought the same theme.

How to prevent cases like this one?

Before you purchase premium themes, ask the designer which plugins are required for it to work. Also make sure you get the required licenses for all of the required plugins, so you will receive all the important updates. And of course, make sure to keep the plugins updated!

Also, set up vulnerability monitoring – you can do that for FREE with the Patchstack Community plan where you can add up to 10 websites and receive real-time alerts when a new vulnerability is found in any of the plugins/themes that you have installed.

You can also turn on protection modules, so the website receives a virtual patch for the vulnerability, giving you time to update or choose what to do next, without leaving the website exposed to the hackers.

I also want to thank the Envato team who reached out to the specific theme developer and this theme is currently removed from the ThemeForest marketplace. The representative from Envato also told us that the pre-packaging the plugins with themes on such way is against the guidelines, and required plugins should only be downloaded from the official WordPress.org plugin directory.

The lack of visibility into premium plugins

Premium plugins and themes often don’t follow the common WordPress best practices. The updating process is often as not straightforward as it is with plugins you install directly from the official WordPress.org plugin repository, and their source code is not open to the public.

Because of this, premium plugins miss out on a big benefit of open-source – namely that anyone can read the code, propose improvements and point out any issues or problems that should be fixed. This is one of the reasons open-source code is usually more secure, as more people have looked into it and potential vulnerabilities get fixed.

This is not the case with premium plugins. Even though most premium plugins are also GPL or have dual-license, the source code is not made public. This means that it’s much harder to keep an eye on updates for the plugin, and there is no benefit from community-driven security oversight.

Based on our experience as the leading vulnerability processor in the WordPress ecosystem, even today the security vulnerabilities are much more severe in the premium plugins compared to the ones that are on the official WordPress.org plugins repository.

Stay safe!


Source: patchstack.com

Translate this article

TAGGED: PoC, Security, Source code, Threats, Vulnerabilities, WordPress
Vitus White October 7, 2023 October 7, 2023
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

How To Disable PHP Execution and Directory Browsing?
How To Disable PHP Execution and Directory Browsing?
Wordpress Threats 18 hours ago
Latest copyright decision in Germany rejects blocking through global DNS resolvers
Latest copyright decision in Germany rejects blocking through global DNS resolvers
Apps 22 hours ago
Restricted Settings in Android 13 and 14
How To 22 hours ago
How to check CPU temp on Windows 11
News 1 day ago
Patchstack Becomes Member Of Open Source Security Foundation
Patchstack Becomes Member Of Open Source Security Foundation
Wordpress Threats 2 days ago

You Might Also Like

How To Disable PHP Execution and Directory Browsing?
Wordpress Threats

How To Disable PHP Execution and Directory Browsing?

18 hours ago
Latest copyright decision in Germany rejects blocking through global DNS resolvers
Apps

Latest copyright decision in Germany rejects blocking through global DNS resolvers

22 hours ago
How To

Restricted Settings in Android 13 and 14

22 hours ago
Patchstack Becomes Member Of Open Source Security Foundation
Wordpress Threats

Patchstack Becomes Member Of Open Source Security Foundation

2 days ago
Show More

Related stories

Several Critical Vulnerabilities including Privilege Escalation, Authentication Bypass, and More Patched in UserPro WordPress Plugin
BridesMaid – neuron writes toasts For those very occasions when you need to give out a powerful
The other day Yandex pleased us with the announcement of a new Midi station – an excellent reason to listen
REMIX – remixes of pictures from neural networksCreate, share and correct works
How to download Diablo IV for free and absolutely legallyBlizzard has opened a free
Rostelecom employees were forced to abandon Android and iOS in favor of Aurora.
Previous Next

10 New Stories

PDF Phishing: Beyond the Bait
A year in recap: Windows accessibility
How to disable news feed from Widgets on Windows 11
How to fix performance issues after upgrading to Windows 11 23H2
Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
Fake CVE Phishing Campaign Tricks WordPress Users Into Installing Malware
Previous Next
Hot News
How To Disable PHP Execution and Directory Browsing?
Latest copyright decision in Germany rejects blocking through global DNS resolvers
Restricted Settings in Android 13 and 14
How to check CPU temp on Windows 11
Patchstack Becomes Member Of Open Source Security Foundation
10alert.com10alert.com
Follow US
© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?