A serious vulnerability found in a WordPress themes plugin with over 200,000 active installations can be exploited to wipe a website’s database and gain administrator access to the site.
ThemeGrill Demo Importer is a popular plugin that allows WordPress website administrators to import demo content, widgets and settings for ThemeGrill themes.
Researchers at web security company WebARX discovered recently that versions 1.3.4 through 1.6.1 of the plugin are affected by a critical vulnerability that allows an unauthenticated attacker to wipe the entire database of a WordPress website. The researchers believe the flaw has existed for the past 3 years.
The security hole can be exploited against websites where a ThemeGrill theme has been installed and activated. Exploitation of the vulnerability causes the database to be populated with default settings and data, and if the database includes a user named “admin,” exploitation will also result in the attacker being automatically logged in as an administrator.
Oliver Sild, the CEO of WebARX, told SecurityWeek that it’s possible that not all WordPress sites on which the ThemeGrill Demo Importer is installed are vulnerable to attacks as their operators may not have used the plugin to actually install a theme — as noted earlier, this is a condition for the exploit to work.
Sild, whose company provides vulnerability detection and virtual patching software to protect websites from third-party component vulnerabilities, noted that exploitation of the ThemeGrill flaw can be automated.
The vulnerability was reported to ThemeGrill developers on February 6 and it was patched on February 16 with the release of version 1.6.2.
WebARX has published a blog post describing the technical details of the vulnerability and how it was patched by the developers.
Related: Flaw in ‘Code Snippets’ Plugin Exposed Many WordPress Sites to Attacks
Related: Authenticated XSS Found in WordPress Plugin Facebook Widget
Related: Recently Disclosed WordPress Plugin Flaws Exploited in Malvertising Operation

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
- Security Update for Chrome 109 Patches 6 Vulnerabilities
- New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch
- Forward Networks Raises $50 Million in Series D Funding
- Apple Patches Exploited iOS Vulnerability in Old iPhones
- FBI Confirms North Korean Hackers Behind $100 Million Horizon Bridge Heist
Latest News
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
- Tenable Launches $25 Million Early-Stage Venture Fund
- 820k Impacted by Data Breach at Zacks Investment Research
- Mapping Threat Intelligence to the NIST Compliance Framework Part 2
- Hive Ransomware Operation Shut Down by Law Enforcement
- US Government Agencies Warn of Malicious Use of Remote Management Software
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
