๐Ÿ” CVE Alert

CVE-2026-6261

HIGH 8.8

Betheme <= 28.4 - Authenticated (Author+) Arbitrary File Upload to Remote Code Execution via Icon Pack Upload

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

The Betheme theme for WordPress is vulnerable to Arbitrary File Upload in versions up to, and including, 28.4. This is due to the upload_icons() function workflow moving and unzipping user-controlled ZIP files into a public uploads directory without validating extracted file types. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files (including PHP) and achieve remote code execution via the Icons icon-pack upload flow.

CWE CWE-434
Vendor muffingroup
Product betheme
Published May 5, 2026
Stay Ahead of the Next One

Get instant alerts for muffingroup betheme

Be the first to know when new high vulnerabilities affecting muffingroup betheme are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

MuffinGroup / Betheme
0 โ‰ค 28.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/722c04c3-8f74-4081-b3a4-cb1ae2027312?source=cve support.muffingroup.com: https://support.muffingroup.com/changelog/

Credits

Craig Smith Leonid Semenenko