JavaScript Backdoor Vulnerability in Pixterme Plugins for WordPress
CVE-2025-8047
Key Information:
- Vendor
WordPress
- Vendor
- CVE Published:
- 14 August 2025
Badges
What is CVE-2025-8047?
The disable-right-click-powered-by-pixterme (v1.2) and pixter-image-digital-license (v1.0) WordPress plugins contain a significant vulnerability. These plugins inadvertently load a compromised JavaScript file sourced from an abandoned S3 bucket. This malicious file can serve as a backdoor, allowing unauthorized access to the affected systems. Currently, it displays an alert promoting security services, and users can be added to a list of allowed domains, thereby silencing the alert upon payment, raising serious concerns about user data safety and plugin integrity.
Affected Version(s)
disable-right-click-powered-by-pixterme 0 <= 1.2
pixter-image-digital-license 0 <= 1.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved