The Invisible Back-Door: CVE-2025-6327
Most bloggers still think brute-force is the big bad wolf.
In 2025 the wolf learned how to pick the lock instead.
King Addons for Elementor—a cute little “extra widgets” plugin with 10 k+ installs—shipped a file-upload feature that never checked who was uploading.
Result: anyone, logged-in or not, could drop a .php file into your uploads folder and visit yoursite.com/wp-content/uploads/2025/11/shell.php to get instant admin rights.
CVSS score? 10.0—the highest possible
The kicker: the plugin was still on the “Recommended” list inside Elementor’s onboarding wizard while the exploit was already circulating on Telegram.
Why Your Security Plugin Might Be the Problem
Irony alert.
The Anti-Malware Security and Brute-Force Firewall plugin—yes, the one literally named to protect you—had an arbitrary file-read bug (CVE-2025-11705) that let attackers download your wp-config.php and read your database password like it was a public blog post
Moral: a plugin with “Security” in the title isn’t automatically secure.
Check the last update date. If it’s older than your milk, hit delete.
The 30-Second “Health Check” You Can Run Today
Copy-paste these four commands into your terminal or ask your host to run them:
# 1. Find every .php file that shouldn’t be in uploads
find ./wp-content/uploads -name "*.php" -type f
# 2. Look for recently modified files (last 7 days)
find ./ -type f -name "*.php" -mtime -7
# 3. See if anybody left a back-door alias
grep -r "eval(" ./wp-content/
# 4. Check for King Addons if you never installed it
wp plugin list --field=name | grep -i king
If any line returns anything you don’t recognise, investigate or nuke it.
3 Lines of Code That Close 90 % of the Hole
Paste these into the .htaccess file that sits in your uploads folder (not the root):
# Block PHP execution in uploads
<FilesMatch "\.(php|phtml|php3|php4|php5|php7|phps)$">
Deny from all
</FilesMatch>
# Stop directory browsing
Options -Indexes
# Hide author scans
RedirectMatch 403 /\?author=([0-9]+)
No plugin required. Works on Apache and LiteSpeed.
Nginx user? Drop the same logic into your server block—there’s a copy-paste snippet here if you need it.
What Happens If You Do Nothing? (Real Numbers)
- 108 new WordPress CVEs dropped in November 2025 alone.
- 31 still have no patch—zero-day territory.
- Patchstack logged 13 800+ live attacks against the Service Finder auth-bypass bug in one month.
- Average cleanup cost for a small business: $2 800 + 3 days offline (source: Sucuri Q3 report).
Still think “I’m too small to be a target”?
The 2025 “Security Stack” That Actually Works
- Update Tuesday – set a calendar reminder.
- Virtual patching – install Patchstack or Solid Security Pro; they auto-mitigate zero-days.
- 2FA everything – Wordfence Login Security or WP 2FA (both free).
- Off-site backups – use BlogVault or ManageWP; test restore before you need it.
- Least-privilege users – nobody needs “Editor” to upload a JPEG.
- Code-free uploads block – the
.htaccesssnippet above.
Do those six and you’re already ahead of 92 % of hacked sites this year.
The scariest 2025 hack isn’t a Hollywood-style DDOS—it’s a silent plugin back-door that lets strangers walk in, order a coffee, and redecorate your living room.
Update ruthlessly, audit weekly, and block PHP in uploads.
Your future self (and your Google ranking) will thank you.
Stay safe out there.