Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10690: CWE-862 Missing Authorization in Bearsthemes Goza - Nonprofit Charity WordPress Theme

0
Critical
VulnerabilityCVE-2025-10690cvecve-2025-10690cwe-862
Published: Fri Sep 19 2025 (09/19/2025, 02:27:00 UTC)
Source: CVE Database V5
Vendor/Project: Bearsthemes
Product: Goza - Nonprofit Charity WordPress Theme

Description

The Goza - Nonprofit Charity WordPress Theme theme for WordPress is vulnerable to unauthorized arbitrary file uploads due to a missing capability check on the 'beplus_import_pack_install_plugin' function in all versions up to, and including, 3.2.2. This makes it possible for unauthenticated attackers to upload zip files containing webshells disguised as plugins from remote locations to achieve remote code execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 18:34:04 UTC

Technical Analysis

CVE-2025-10690 is a critical security vulnerability identified in the Bearsthemes Goza - Nonprofit Charity WordPress Theme, affecting all versions up to and including 3.2.2. The root cause is a missing authorization check (CWE-862) in the 'beplus_import_pack_install_plugin' function, which is responsible for importing plugin packs. This missing capability check allows unauthenticated attackers to upload arbitrary zip files remotely. These zip files can contain webshells disguised as legitimate plugins, enabling attackers to execute arbitrary code on the affected server. The vulnerability does not require any authentication or user interaction, making it trivially exploitable over the network. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with attack vector being network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability is particularly dangerous because it allows full remote code execution, potentially leading to complete server takeover, data theft, defacement, or use of the server as a pivot point for further attacks. Despite no known exploits in the wild at the time of publication, the vulnerability's characteristics make it a prime target for attackers. The affected product is a WordPress theme used primarily by nonprofit organizations, which may have less robust security postures, increasing risk. No official patches or updates have been linked yet, emphasizing the need for immediate mitigation steps by administrators.

Potential Impact

The impact of CVE-2025-10690 is severe and wide-ranging. Successful exploitation results in remote code execution with no authentication, allowing attackers to fully compromise affected WordPress sites. This can lead to unauthorized data access, data modification or deletion, website defacement, and use of the compromised server to launch further attacks such as phishing, malware distribution, or lateral movement within networks. Nonprofit organizations using the Goza theme may face reputational damage, loss of donor trust, and potential legal consequences due to data breaches. Additionally, compromised servers can be enlisted into botnets or used to attack other targets, amplifying the threat. The vulnerability's ease of exploitation and high impact on confidentiality, integrity, and availability make it a critical risk for organizations worldwide using this theme. The lack of authentication and user interaction requirements means automated attacks and mass exploitation campaigns are feasible, increasing the threat landscape significantly.

Mitigation Recommendations

1. Immediate removal or disabling of the Goza - Nonprofit Charity WordPress Theme until a patched version is released. 2. Monitor official Bearsthemes channels and WordPress theme repositories for security updates or patches addressing CVE-2025-10690 and apply them promptly. 3. Implement Web Application Firewall (WAF) rules to block requests targeting the 'beplus_import_pack_install_plugin' function or suspicious plugin upload attempts. 4. Restrict file upload permissions on the server to prevent unauthorized write access, especially to plugin directories. 5. Conduct thorough audits of existing installations for any signs of compromise, including unknown plugins or webshell files. 6. Harden WordPress installations by disabling plugin and theme installations for non-admin users and limiting administrative access via IP whitelisting or multi-factor authentication. 7. Regularly back up WordPress sites and databases to enable quick recovery in case of compromise. 8. Employ intrusion detection systems to alert on anomalous file uploads or code execution patterns. 9. Educate site administrators about the risks of installing unverified themes and plugins and encourage use of only trusted sources. 10. Consider isolating WordPress environments using containerization or sandboxing to limit the blast radius of potential exploits.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-18T13:57:31.775Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ccc437ca83b36a9f716bdd

Added to database: 9/19/2025, 2:47:19 AM

Last enriched: 2/27/2026, 6:34:04 PM

Last updated: 3/22/2026, 6:46:03 AM

Views: 160

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses