Critical Vulnerability Found in WordPress Malware Scanner Plugin

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 16, 2025 3 min read

WordPress Malware Scanner Plugin Contains Vulnerability

The Malcure Malware Scanner plugin has been identified with a high-severity vulnerability rated at 8.1 by Wordfence. This plugin, which is installed on over 10,000 WordPress websites, is susceptible to “Arbitrary File Deletion” due to a missing capability check on the wpmr_delete_file() function. Although an authenticated attacker requires only subscriber-level access to exploit this vulnerability, it poses significant risks.

Malcure Malware Scanner Vulnerability

Image courtesy of Search Engine Journal

According to Wordfence, “This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files making remote code execution possible. This is only exploitable when advanced mode is enabled on the site.” There is currently no patch available, and users are advised to uninstall the plugin to mitigate risk.

Malcure Plugin Severity Rating

Image courtesy of Search Engine Journal

The plugin is temporarily unavailable for download as it is under review due to this critical vulnerability.

Additional WordPress Vulnerabilities

Another notable vulnerability is associated with the Malware Scanner WordPress plugin before version 4.5.2, where it fails to sanitize and escape some of its settings. This leads to Cross-Site Scripting (XSS) attacks when unfiltered_html is disallowed, particularly in multisite setups.

Severity and References

CVSS Score

  • Overall Score: 4.8 / 10
  • Attack Vector: Network
  • Privileges Required: High

Best Practices for WordPress Vulnerability Scanners

Utilizing a WordPress vulnerability scanner is essential for maintaining site security. These tools alert users to known vulnerabilities in the WordPress core, plugins, or themes. It is crucial to regularly update vulnerable plugins and themes to avoid potential security breaches.

Recommended Scanners

  1. MalCare
  • Test results: Great
  • Price: Free
  • Detects a wide range of vulnerabilities, including SQL injection and XSS.
  • More information can be found at MalCare.
  1. Patchstack
  • Test results: Great
  • Price: Free
  • Flags vulnerabilities and provides guidance on severity.
  1. WPScan
  • Test results: Great
  • Price: Free for 25 scans a day.
  • One of the most comprehensive vulnerability scanners available.
  1. Wordfence
  • Test results: Very Good
  • Price: Free
  • A popular security plugin that flags vulnerabilities effectively.
  1. Defender
  • Test results: Average
  • Price: Free
  • Provides a good overview of vulnerabilities but may miss some obscure ones.
  1. Sucuri
  • Test results: Bad
  • Price: Free
  • Limited vulnerability detection; primarily offers a list of available updates.

For a detailed comparison of various WordPress vulnerability scanners, including their test results, features, and pricing, visit MalCare.

Handling Detected Vulnerabilities

When a vulnerability is flagged, it is crucial to act quickly. Users should update their site, particularly if the issue is with a smaller plugin or theme. For larger plugins, testing updates in a staging environment is advisable to prevent disruptions on the live site.

For further assistance with website security and to explore comprehensive protection solutions, consider visiting Gopher Security.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now
SolarWinds Web Help Desk

SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now

Critical RCE & Auth Bypass flaws in SolarWinds Web Help Desk are fixed! Don't risk it. Update to v2026.1 now to protect your systems. Learn more.

By Edward Zhou March 9, 2026 4 min read
common.read_full_article
AI vs Human Hackers: Who Prevails in 2026 Pen Testing?
AI hacking

AI vs Human Hackers: Who Prevails in 2026 Pen Testing?

Discover the results of a groundbreaking study comparing AI agents and human hackers in web vulnerability exploitation. See who prevails and what it means for your security. Read now!

By Jim Gagnard March 6, 2026 6 min read
common.read_full_article
Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends

Exploits are now the top intrusion method, outpacing phishing. Discover why rapid vulnerability patching is critical and how to bolster your defenses. Read more!

By Edward Zhou March 4, 2026 4 min read
common.read_full_article
Google Dismantles IPIDEA, Major Proxy Network for 550+ Threats
Ipidea proxy network

Google Dismantles IPIDEA, Major Proxy Network for 550+ Threats

Google has disrupted Ipidea, a massive residential proxy network used by cybercriminals. Learn how this action impacts online security and what it means for threat actors. Read now!

By Brandon Woo February 27, 2026 4 min read
common.read_full_article