Recent Vulnerabilities in WordPress Plugins: Malware Risks and Solutions

Edward Zhou
Edward Zhou

CEO & Co-Founder

 
July 16, 2025
3 min read

WordPress Malware Scanner Plugin Contains Vulnerability

Wordfence published an advisory on the WordPress Malcure Malware Scanner plugin, which was discovered to have a vulnerability rated at a severity level of 8.1. At the time of publishing, there is no patch to fix the problem.

WordPress Malware Scanner Plugin Contains Vulnerability

Malcure Malware Scanner Vulnerability

The Malcure Malware Scanner plugin, installed on over 10,000 WordPress websites, is vulnerable to “Arbitrary File Deletion due to a missing capability check on the wpmr_delete_file() function.” Authenticated attackers can exploit this vulnerability, which requires only subscriber level authentication.

According to Wordfence, this makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files, making remote code execution possible. Users are cautioned to uninstall the plugin to mitigate risk as it is currently unavailable for download.

Screenshot Of Malcure Plugin At WordPress Repository

Screenshot Of Malcure Plugin


CVE-2024-6297 WordPress Plugin Backdoor

Severity: Critical

Invicti detected an indicator suggesting that the scanned application was backdoored. The detected payload was part of an attack on WordPress plugin maintainers and placed in various different WordPress plugins.

Impact

An attacker can execute arbitrary commands on the system or run JavaScript code under the context of your web application.

Actions To Take

  1. Remove the identified web backdoor from your web server.
  2. Ensure that all of the WordPress plugins on your website are up-to-date.

Classifications

Web Application Vulnerabilities Index


Identifying and Removing Malware

In discussions on WordPress support forums, users have reported malicious attacks resulting in access denied errors. Common malware behaviors include creating new index files in top-level folders and modifying existing files, such as wp-settings.php and index.php.

Recommended Steps for Removal

  1. Update all passwords and ensure everything is up-to-date.
  2. Use Wordfence and follow their recommended security measures.
  3. Regularly scan plugins for vulnerabilities at WPScan Plugins.

Malware often injects itself through files that return necessary information about WordPress. It is advised to disable file editing and directory listing to enhance security. Continuous monitoring and updating of plugins are essential to mitigate risks.


8 Vulnerable WordPress Plugins Attacked Recently

Vulnerable plugins are a major reason for WordPress site hacks, contributing to 55.9% of attacks. Keeping plugins updated is crucial for website security.

Vulnerable Plugins Overview

  1. Duplicator – WordPress Migration Plugin: Vulnerable to arbitrary file download. An update was released in February 2020.
  2. ThemeGrill Demo Importer: Hackers could take control of admin accounts. A patch was released in the same month.
  3. Profile Builder Plugin: Critical vulnerability allowed unauthorized admin registrations. Updated to version 3.1.1.
  4. Flexible Checkout Fields For WooCommerce: Hackers exploited a vulnerability to inject code. Security patches were issued.
  5. ThemeREX Addons: Vulnerability allowed creation of admin accounts. Users must subscribe for updates.
  6. Async JavaScript: Vulnerability allowed remote attacks. Developers released fixes promptly.
  7. Modern Events Calendar Lite: Malware injection vulnerability addressed in updates.
  8. 10Web Map Builder for Google Maps: Recent vulnerabilities patched in February.

For a comprehensive security strategy, it's essential to regularly update all plugins and monitor for vulnerabilities. Use services like MalCare security plugin to manage updates effectively.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article