CVE-2025-30881

4.3 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in the ThemeHunk Big Store WordPress theme that allows attackers to bypass access controls. It affects all versions up to 2.0.8, potentially enabling unauthorized access to restricted functionality. WordPress sites using this theme are vulnerable.

💻 Affected Systems

Products:
  • ThemeHunk Big Store WordPress Theme
Versions: All versions up to and including 2.0.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Big Store theme active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify theme settings, inject malicious code, or access administrative functionality leading to site compromise.

🟠

Likely Case

Unauthorized users could modify theme configurations, change site appearance, or access functionality intended only for administrators.

🟢

If Mitigated

With proper access controls and authentication checks, impact would be limited to authorized users only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some WordPress knowledge but is straightforward once access control weaknesses are identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.9 or later

Vendor Advisory: https://patchstack.com/database/wordpress/theme/big-store/vulnerability/wordpress-big-store-theme-2-0-8-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check for Big Store theme updates. 4. Update to version 2.0.9 or later. 5. Verify theme functions correctly after update.

🔧 Temporary Workarounds

Temporary Theme Deactivation

all

Deactivate the vulnerable theme until patched

wp theme deactivate big-store

Access Restriction via .htaccess

linux

Restrict access to theme files via web server configuration

# Add to .htaccess: Order Deny,Allow
Deny from all

🧯 If You Can't Patch

  • Switch to a different WordPress theme temporarily
  • Implement strict access controls and monitor for unauthorized theme modifications

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Appearance > Themes for Big Store theme version 2.0.8 or earlier

Check Version:

wp theme list --name=big-store --field=version

Verify Fix Applied:

Verify Big Store theme version is 2.0.9 or later in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to theme admin endpoints
  • Unexpected theme file modifications

Network Indicators:

  • HTTP requests to theme-specific admin endpoints from unauthorized IPs

SIEM Query:

source="wordpress.log" AND ("big-store" OR "themehunk") AND ("admin" OR "ajax") AND status=200 AND user_role!=administrator

🔗 References

📤 Share & Export