WordPress Security Vulnerabilities
October 2025
October 2025 continued to be an active month for WordPress security, with a notable increase in plugin disclosures and renewed exploitation of older flaws. According to multiple trackers, more than 470 new vulnerabilities were identified across plugins and themes this month. While the WordPress core saw relatively minor issues, several third-party components presented high-risk attack surfaces affecting thousands of active installations worldwide.
Plugin and Theme Vulnerabilities
The majority of new disclosures this month involved third-party plugins and bundled themes. Notable cases include:Several older vulnerabilities resurfaced in October, particularly affecting GutenKit and Hunk Companion, which were exploited again after patches were ignored by users who had not updated.
| Plugin / Theme | CVE ID | Risk Level | Description | 
|---|---|---|---|
| Service Finder Bookings | CVE-2025-5947 | Critical (9.8) | Authentication bypass that allows login as any user, including admin. Actively exploited. | 
| Keyy Two-Factor Authentication | CVE-2025-10293 | High (8.8) | Privilege escalation due to missing capability checks. Plugin removed from repository. | 
| Motors Car Dealership & Classified Listings | CVE-2025-10494 | High (8.1) | Unauthenticated high-severity flaw enabling unauthorized actions. | 
| Find and Replace Content | CVE-2025-10313 | High (7.2) | Missing capability checks leading to stored XSS and unintended content replacement. | 
| Core XML-RPC Pingback (legacy) | CVE-2025-54352 | Medium (3.7) | Information disclosure of draft/private post titles on outdated core versions. | 
Several older vulnerabilities resurfaced in October, particularly affecting GutenKit and Hunk Companion, which were exploited again after patches were ignored by users who had not updated.
Risks and Impacts
Attackers continue to target unpatched sites to gain administrative access, inject malicious redirects, or distribute malware through compromised themes and plugins.
The most severe case this month – CVE-2025-5947 – has seen over 13,000 exploitation attempts reported in the wild. These incidents highlight how quickly public proof-of-concepts are weaponized once vulnerabilities are disclosed.
Website owners running outdated or abandoned plugins remain particularly vulnerable to mass exploitation campaigns that automate credential theft, SEO spam injection, and unauthorized user creation.
Recommendations for Site Owners
To minimize exposure:
Update core immediately to WordPress 6.8.3 or later.
Audit all plugins and themes and remove any that are abandoned or unmaintained.
Apply available patches for all affected components listed above.
Review user accounts and roles — remove unused admin accounts and enforce strong authentication.
Check access logs for unusual login activity, especially involving the Service Finder or Keyy plugins.
Maintain verified backups before performing large updates.
Use a web application firewall (WAF) or virtual patching solution to block exploitation attempts.
Conclusion
While the WordPress core remains stable, plugin ecosystems continue to be the primary vector for exploitation. Regular maintenance, disciplined update routines, and layered protection remain the most reliable methods to preserve site integrity and uptime.
October saw many new plugin and theme issues. Core updates were minor. Most risk comes from third-party components that aren’t updated quickly.
WordPress Core Vulnerabilities
WordPress 6.8.3 fixed two medium issues: one data exposure bug and one XSS in menus.
If you’re on an older version, update to 6.8.3 or later.
Plugin and Theme Vulnerabilities
High-risk items to check first:
Service Finder Bookings (CVE-2025-5947): authentication bypass. Actively exploited.
Keyy Two-Factor Authentication (CVE-2025-10293): privilege escalation. Removed from the repo.
Motors Car Dealership & Classified Listings (CVE-2025-10494): unauthenticated actions.
Find and Replace Content (CVE-2025-10313): stored XSS via missing capability checks.
Legacy XML-RPC pingback (CVE-2025-54352): info disclosure on old WordPress versions.
Note: Older flaws in GutenKit and Hunk Companion are being targeted again where sites never applied updates.
Risks and Impacts
Attackers target outdated plugins to gain admin access, inject redirects, create rogue users, or spread malware.
The Service Finder issue has widespread, automated probing. Unpatched sites are easy targets.
Recommendations for Site Owners
Update core to 6.8.3+.
Patch or remove vulnerable plugins/themes listed above. If no fix, disable.
Audit users and roles. Remove unused admins.
Check logs for odd logins, new admin accounts, or unexpected file changes.
Back up and verify you can restore.
Reduce bloat. Remove unused plugins/themes.
Use a WAF or virtual patching to block known exploits.
Conclusion
Core is stable. Most risk is from third-party components. Stay current, monitor, and keep only what you need. This keeps sites available and limits exposure.
Need expert help protecting your environment?
Get Started