Skip to main content

CVE-2025-8047: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in disable-right-click-powered-by-pixterme

Critical
VulnerabilityCVE-2025-8047cvecve-2025-8047cwe-829
Published: Thu Aug 14 2025 (08/14/2025, 09:53:17 UTC)
Source: CVE Database V5
Product: disable-right-click-powered-by-pixterme

Description

The disable-right-click-powered-by-pixterme through v1.2 and pixter-image-digital-license thtough v1.0 WordPress plugins load a JavaScript file which has been compromised from an apparent abandoned S3 bucket. It can be used as a backdoor by those who control it, but it currently displays an alert marketing security services. Users that pay are added to allowedDomains to suppress the popup.

AI-Powered Analysis

AILast updated: 08/14/2025, 10:18:08 UTC

Technical Analysis

CVE-2025-8047 is a vulnerability affecting two WordPress plugins: disable-right-click-powered-by-pixterme (up to version 1.2) and pixter-image-digital-license (up to version 1.0). The core issue stems from these plugins loading a JavaScript file from an external Amazon S3 bucket that appears to be abandoned and no longer under the control of the original plugin developers. This scenario constitutes a CWE-829 vulnerability, which involves the inclusion of functionality from an untrusted control sphere. Because the JavaScript file is hosted externally and can be modified by whoever controls the S3 bucket, attackers who gain control over this bucket can inject malicious code into websites using these plugins. Currently, the injected code displays an alert promoting security services, and users who pay for these services are added to an allowedDomains list to suppress the popup. However, the potential for abuse is significant, as the compromised JavaScript could be altered to act as a backdoor, enabling attackers to execute arbitrary code, steal sensitive data, or perform other malicious actions on affected WordPress sites. The vulnerability arises from the plugins' reliance on an external resource without verifying its integrity or ensuring its continued trustworthiness. No patches or updates have been published yet, and there are no known exploits in the wild at this time. The vulnerability was reserved in July 2025 and published in August 2025, indicating recent discovery and disclosure. The absence of a CVSS score suggests that the severity has not been formally assessed, but the technical details indicate a potentially serious risk due to the possibility of remote code execution and persistent backdoor access.

Potential Impact

For European organizations, the impact of CVE-2025-8047 can be significant, especially for those relying on WordPress websites that use the affected plugins. The compromise of the external JavaScript resource can lead to unauthorized code execution on the client side, which may result in data leakage, defacement, or the establishment of persistent backdoors for further exploitation. This can undermine the confidentiality and integrity of organizational data and damage brand reputation. Additionally, if attackers leverage the backdoor capabilities, they could pivot to internal networks or deploy malware, increasing the risk of broader cyber incidents. Given the widespread use of WordPress across European businesses, including e-commerce, government, and media sectors, the vulnerability could disrupt online services and erode customer trust. The fact that the malicious code currently advertises security services suggests a low-level exploitation, but the underlying risk remains high if the S3 bucket falls under the control of more malicious actors. The lack of authentication or user interaction required for the malicious script to load increases the attack surface, making it easier for attackers to exploit. Organizations subject to strict data protection regulations such as GDPR may face compliance risks if personal data is compromised through this vulnerability.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the disable-right-click-powered-by-pixterme and pixter-image-digital-license plugins. If found, they should disable or remove these plugins until a secure update or patch is released by the developers. As a temporary mitigation, organizations can implement Content Security Policy (CSP) headers to restrict loading of scripts from untrusted external sources, specifically blocking the compromised S3 bucket domain. Additionally, organizations should monitor network traffic and website behavior for unusual JavaScript activity or unexpected popups. Web Application Firewalls (WAFs) can be configured to detect and block requests to the malicious S3 bucket. It is also advisable to conduct integrity checks on all externally loaded resources and consider hosting critical JavaScript files locally to avoid reliance on third-party hosting. Organizations should subscribe to vulnerability advisories from WordPress and plugin developers to apply patches promptly once available. Finally, educating website administrators about the risks of using abandoned or unmaintained plugins can prevent similar issues in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-07-22T12:37:49.835Z
Cvss Version
null
State
PUBLISHED

Threat ID: 689db456ad5a09ad005982e4

Added to database: 8/14/2025, 10:03:02 AM

Last enriched: 8/14/2025, 10:18:08 AM

Last updated: 8/16/2025, 12:34:39 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats