CVE-2025-8047: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in disable-right-click-powered-by-pixterme
The disable-right-click-powered-by-pixterme through v1.2 and pixter-image-digital-license thtough v1.0 WordPress plugins load a JavaScript file which has been compromised from an apparent abandoned S3 bucket. It can be used as a backdoor by those who control it, but it currently displays an alert marketing security services. Users that pay are added to allowedDomains to suppress the popup.
AI Analysis
Technical Summary
CVE-2025-8047 is a vulnerability affecting two WordPress plugins: disable-right-click-powered-by-pixterme (up to version 1.2) and pixter-image-digital-license (up to version 1.0). The core issue stems from these plugins loading a JavaScript file from an external Amazon S3 bucket that appears to be abandoned and no longer under the control of the original plugin developers. This scenario constitutes a CWE-829 vulnerability, which involves the inclusion of functionality from an untrusted control sphere. Because the JavaScript file is hosted externally and can be modified by whoever controls the S3 bucket, attackers who gain control over this bucket can inject malicious code into websites using these plugins. Currently, the injected code displays an alert promoting security services, and users who pay for these services are added to an allowedDomains list to suppress the popup. However, the potential for abuse is significant, as the compromised JavaScript could be altered to act as a backdoor, enabling attackers to execute arbitrary code, steal sensitive data, or perform other malicious actions on affected WordPress sites. The vulnerability arises from the plugins' reliance on an external resource without verifying its integrity or ensuring its continued trustworthiness. No patches or updates have been published yet, and there are no known exploits in the wild at this time. The vulnerability was reserved in July 2025 and published in August 2025, indicating recent discovery and disclosure. The absence of a CVSS score suggests that the severity has not been formally assessed, but the technical details indicate a potentially serious risk due to the possibility of remote code execution and persistent backdoor access.
Potential Impact
For European organizations, the impact of CVE-2025-8047 can be significant, especially for those relying on WordPress websites that use the affected plugins. The compromise of the external JavaScript resource can lead to unauthorized code execution on the client side, which may result in data leakage, defacement, or the establishment of persistent backdoors for further exploitation. This can undermine the confidentiality and integrity of organizational data and damage brand reputation. Additionally, if attackers leverage the backdoor capabilities, they could pivot to internal networks or deploy malware, increasing the risk of broader cyber incidents. Given the widespread use of WordPress across European businesses, including e-commerce, government, and media sectors, the vulnerability could disrupt online services and erode customer trust. The fact that the malicious code currently advertises security services suggests a low-level exploitation, but the underlying risk remains high if the S3 bucket falls under the control of more malicious actors. The lack of authentication or user interaction required for the malicious script to load increases the attack surface, making it easier for attackers to exploit. Organizations subject to strict data protection regulations such as GDPR may face compliance risks if personal data is compromised through this vulnerability.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the disable-right-click-powered-by-pixterme and pixter-image-digital-license plugins. If found, they should disable or remove these plugins until a secure update or patch is released by the developers. As a temporary mitigation, organizations can implement Content Security Policy (CSP) headers to restrict loading of scripts from untrusted external sources, specifically blocking the compromised S3 bucket domain. Additionally, organizations should monitor network traffic and website behavior for unusual JavaScript activity or unexpected popups. Web Application Firewalls (WAFs) can be configured to detect and block requests to the malicious S3 bucket. It is also advisable to conduct integrity checks on all externally loaded resources and consider hosting critical JavaScript files locally to avoid reliance on third-party hosting. Organizations should subscribe to vulnerability advisories from WordPress and plugin developers to apply patches promptly once available. Finally, educating website administrators about the risks of using abandoned or unmaintained plugins can prevent similar issues in the future.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-8047: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in disable-right-click-powered-by-pixterme
Description
The disable-right-click-powered-by-pixterme through v1.2 and pixter-image-digital-license thtough v1.0 WordPress plugins load a JavaScript file which has been compromised from an apparent abandoned S3 bucket. It can be used as a backdoor by those who control it, but it currently displays an alert marketing security services. Users that pay are added to allowedDomains to suppress the popup.
AI-Powered Analysis
Technical Analysis
CVE-2025-8047 is a vulnerability affecting two WordPress plugins: disable-right-click-powered-by-pixterme (up to version 1.2) and pixter-image-digital-license (up to version 1.0). The core issue stems from these plugins loading a JavaScript file from an external Amazon S3 bucket that appears to be abandoned and no longer under the control of the original plugin developers. This scenario constitutes a CWE-829 vulnerability, which involves the inclusion of functionality from an untrusted control sphere. Because the JavaScript file is hosted externally and can be modified by whoever controls the S3 bucket, attackers who gain control over this bucket can inject malicious code into websites using these plugins. Currently, the injected code displays an alert promoting security services, and users who pay for these services are added to an allowedDomains list to suppress the popup. However, the potential for abuse is significant, as the compromised JavaScript could be altered to act as a backdoor, enabling attackers to execute arbitrary code, steal sensitive data, or perform other malicious actions on affected WordPress sites. The vulnerability arises from the plugins' reliance on an external resource without verifying its integrity or ensuring its continued trustworthiness. No patches or updates have been published yet, and there are no known exploits in the wild at this time. The vulnerability was reserved in July 2025 and published in August 2025, indicating recent discovery and disclosure. The absence of a CVSS score suggests that the severity has not been formally assessed, but the technical details indicate a potentially serious risk due to the possibility of remote code execution and persistent backdoor access.
Potential Impact
For European organizations, the impact of CVE-2025-8047 can be significant, especially for those relying on WordPress websites that use the affected plugins. The compromise of the external JavaScript resource can lead to unauthorized code execution on the client side, which may result in data leakage, defacement, or the establishment of persistent backdoors for further exploitation. This can undermine the confidentiality and integrity of organizational data and damage brand reputation. Additionally, if attackers leverage the backdoor capabilities, they could pivot to internal networks or deploy malware, increasing the risk of broader cyber incidents. Given the widespread use of WordPress across European businesses, including e-commerce, government, and media sectors, the vulnerability could disrupt online services and erode customer trust. The fact that the malicious code currently advertises security services suggests a low-level exploitation, but the underlying risk remains high if the S3 bucket falls under the control of more malicious actors. The lack of authentication or user interaction required for the malicious script to load increases the attack surface, making it easier for attackers to exploit. Organizations subject to strict data protection regulations such as GDPR may face compliance risks if personal data is compromised through this vulnerability.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the disable-right-click-powered-by-pixterme and pixter-image-digital-license plugins. If found, they should disable or remove these plugins until a secure update or patch is released by the developers. As a temporary mitigation, organizations can implement Content Security Policy (CSP) headers to restrict loading of scripts from untrusted external sources, specifically blocking the compromised S3 bucket domain. Additionally, organizations should monitor network traffic and website behavior for unusual JavaScript activity or unexpected popups. Web Application Firewalls (WAFs) can be configured to detect and block requests to the malicious S3 bucket. It is also advisable to conduct integrity checks on all externally loaded resources and consider hosting critical JavaScript files locally to avoid reliance on third-party hosting. Organizations should subscribe to vulnerability advisories from WordPress and plugin developers to apply patches promptly once available. Finally, educating website administrators about the risks of using abandoned or unmaintained plugins can prevent similar issues in the future.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-07-22T12:37:49.835Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 689db456ad5a09ad005982e4
Added to database: 8/14/2025, 10:03:02 AM
Last enriched: 8/14/2025, 10:18:08 AM
Last updated: 8/16/2025, 12:34:39 AM
Views: 14
Related Threats
CVE-2025-8113: CWE-79 Cross-Site Scripting (XSS) in Ebook Store
UnknownCVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.