Description
The Betheme theme for WordPress is vulnerable to Arbitrary File Upload in versions up to, and including, 28.4. This is due to the upload_icons() function workflow moving and unzipping user-controlled ZIP files into a public uploads directory without validating extracted file types. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files (including PHP) and achieve remote code execution via the Icons icon-pack upload flow.
Published: 2026-05-05
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Betheme for WordPress allows authenticated users with author level or higher to upload ZIP files containing any file types. The upload_icons() workflow extracts the zip into a publicly accessible uploads directory without validating the file extensions. An attacker can therefore upload a PHP script and subsequently trigger its execution on the server, achieving remote code execution.

Affected Systems

Any WordPress site using MuffinGroup’s Betheme theme up to and including version 28.4 is affected. The vulnerability is triggered by the icon‑pack upload functionality and requires that the attacker holds author‑level or higher privileges.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity attack. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, so public exploitation data is limited. However, the attack path is clear: an authenticated author+ can upload a PHP payload via the icon‑pack flow and execute it, giving full control over the affected WordPress installation. The lack of file‑type validation is the core weakness (CWE‑434).

Generated by OpenCVE AI on May 5, 2026 at 12:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Betheme to version 28.5 or later, which implements proper file‑type validation for icon uploads.
  • If an upgrade is not immediately possible, restrict the icon‑pack upload capability so that author+ users cannot upload files, or disable the feature entirely until a patch is applied.
  • Perform a thorough scan of the <code>wp-content/uploads</code> directory for any PHP or other executable files uploaded by users and remove them.

Generated by OpenCVE AI on May 5, 2026 at 12:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 05 May 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Muffingroup
Muffingroup betheme
Wordpress
Wordpress wordpress
Vendors & Products Muffingroup
Muffingroup betheme
Wordpress
Wordpress wordpress

Tue, 05 May 2026 11:45:00 +0000

Type Values Removed Values Added
Description The Betheme theme for WordPress is vulnerable to Arbitrary File Upload in versions up to, and including, 28.4. This is due to the upload_icons() function workflow moving and unzipping user-controlled ZIP files into a public uploads directory without validating extracted file types. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files (including PHP) and achieve remote code execution via the Icons icon-pack upload flow.
Title Betheme <= 28.4 - Authenticated (Author+) Arbitrary File Upload to Remote Code Execution via Icon Pack Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Muffingroup Betheme
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-05T15:01:12.799Z

Reserved: 2026-04-13T23:57:52.714Z

Link: CVE-2026-6261

cve-icon Vulnrichment

Updated: 2026-05-05T15:01:04.021Z

cve-icon NVD

Status : Received

Published: 2026-05-05T12:16:21.453

Modified: 2026-05-05T12:16:21.453

Link: CVE-2026-6261

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T14:15:19Z

Weaknesses