Close Menu
  • Home
  • Higher ED
  • News
  • Regulations
    • U.S. State Privacy Legislation
    • General Data Protection Regulation
    • New York Privacy Act
    • California Privacy Rights Act/California Consumer Privacy Act
  • AI
    • AI – Info Tech News
    • Fordham Artificial Intelligence for Faculty and Staff
    • How Emory University Accelerated AI Research in the Cloud
  • Secure IT News
  • Info Tech News
  • Resources
    • Privacy Glossary of Terms
    • Privacy Policy
    • Your Privacy Questions Answered
    • NIST Privacy Framework
    • US State Privacy Legislation Tracker
    • Safeguarding Data and Student Privacy: A Handbook for Higher Education
    • Privacy Field Guides
    • Access Now Blog
    • Fordham CLIP
  • About
Facebook X (Twitter) Instagram
Trending
  • National Vulnerability Database Discovers Three Vulnerabilities That Leave 10,000 WordPress Websites At Risk of Exploitation
  • Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort
  • U.S. Lawmakers Push Back Against UK’s Demand for an Apple Encryption Backdoor
  • Beyond Goodbye: Safeguarding Employee Data Privacy After Death
  • AI Notetakers in Meetings: Balancing Efficiency with Privacy and Risk
  • Are You Ready for Web 3?
  • Stay Ahead of Scammers in 2025
  • What are VPNs?
Facebook X (Twitter) Instagram
Privacy at Fordham University
  • Home
  • Higher ED

    Strengthening Website Security in Higher Education: Lessons from the FTC’s GoDaddy Settlement

    January 21, 2025

    Merging AI Innovation with IT Expertise in Risk Management

    January 6, 2025

    Staff Highlight – Marc Herzog

    January 3, 2025

    Staff Highlight – Shannon Ortiz

    January 2, 2025

    AI Guidance in Schools

    October 4, 2024
  • News
  • Regulations
    1. U.S. State Privacy Legislation
    2. General Data Protection Regulation
    3. New York Privacy Act
    4. California Privacy Rights Act/California Consumer Privacy Act
    Featured

    Reauthorized Section 702 of the Foreign Intelligence Surveillance Act

    By Josephine Law, FIP, CIPP/US, CIPMApril 22, 20242 Mins Read
    Recent

    U.S. Lawmakers Push Back Against UK’s Demand for an Apple Encryption Backdoor

    February 21, 2025

    Beyond Goodbye: Safeguarding Employee Data Privacy After Death

    February 19, 2025

    Opt-In or Opt-Out, Does it Matter?

    January 20, 2025
  • AI
    1. AI – Info Tech News
    2. Fordham Artificial Intelligence for Faculty and Staff
    3. How Emory University Accelerated AI Research in the Cloud
    Featured

    Merging AI Innovation with IT Expertise in Risk Management

    By Josephine Law, FIP, CIPP/US, CIPMJanuary 6, 20251 Min Read
    Recent

    Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort

    July 22, 2025

    AI Notetakers in Meetings: Balancing Efficiency with Privacy and Risk

    February 19, 2025

    LinkedIn Accused of Using Private Messages to Train AI Models

    January 30, 2025
  • Secure IT News
  • Info Tech News
  • Resources
    • Privacy Glossary of Terms
    • Privacy Policy
    • Your Privacy Questions Answered
    • NIST Privacy Framework
    • US State Privacy Legislation Tracker
    • Safeguarding Data and Student Privacy: A Handbook for Higher Education
    • Privacy Field Guides
    • Access Now Blog
    • Fordham CLIP
  • About
Privacy at Fordham University
You are at:Home»News»National Vulnerability Database Discovers Three Vulnerabilities That Leave 10,000 WordPress Websites At Risk of Exploitation
News

National Vulnerability Database Discovers Three Vulnerabilities That Leave 10,000 WordPress Websites At Risk of Exploitation

Vincent Fermo, GSAS '26By Vincent Fermo, GSAS '26August 5, 2025No Comments2 Mins Read
A photo of a computer with different floating icons.
image from istockphoto.com
Share
Facebook Twitter LinkedIn Pinterest Copy Link

Recently, three vulnerabilities were discovered that affected over 10,000 WordPress sites.  The vulnerabilities include Arbitrary File Upload, Arbitrary File Deletion, and Arbitrary File Move which could potentially allow unauthorized attackers to execute malicious code or access and delete important files.  The National Vulnerability Database has recorded these vulnerabilities and has provided each of them with a numerical score ranging from 0 (least critical) to 10 (most critical). You can find these and more from the National Institute of Standards and Technology website – nist.gov.

The Vulnerabilities:

CVE-2025-7340 (Score: 9.8 CRITICAL):  The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. plugin for WordPress is vulnerable to unknown file uploads due to a missing file type validation function in every version including its most recent, 2.2.1.  If properly executed, attackers could remotely upload arbitrary files and run remote code execution.  This vulnerability was originally founded on July 14, 2025.

CVE-2025-7341 (Score: 9.8 CRITICAL): Similar to CVE-2025-7340, this vulnerability allowed for file deletion through a temp_file_delete() function due to an insufficient file path.  Research has noted that if a certain file was deleted (i.e. wp-config.php), attackers could enable setup mode of the website and give themselves full control if it was directed towards a new database.

CVE-2025-7360 (Score: 9.8 CRITICAL): This vulnerability allows attackers to move files on the server itself which could lead to remote code execution.

Remediation Strategies:

Listed below are other strategies that students, users, and businesses can use to remain safe.

Update Plugins: 

 

    • This vulnerability has since been patched and WordPress strongly urges users to update to release 2.2.2 immediately.  

    • Using outdated plugins may leave your website vulnerable to such attacks.

Deactivate or Remove Unused Plugins

 

    • By removing any unused plugins, this leads to fewer potential vulnerabilities

    • This can significantly reduce one’s attack surface and potentially limit entry points for unknown threats

Restrict File Permissions:

 

    • Ensure that the WordPress file and the directory permissions follow the principle of least privilege.

    • The principle of least privilege states that systems should restrict access privileges of certain users to the minimum necessary to accomplish tasks.

    • This principle can prevent the execution of unauthorized scripts and the modification or removal of sensitive files

Sources:
https://nvd.nist.gov/vuln/detail/CVE-2025-7340

https://nvd.nist.gov/vuln/detail/CVE-2025-7341

https://nvd.nist.gov/vuln/detail/CVE-2025-7360

news privacy Security
Vincent Fermo, GSAS '26

I am a Cybersecurity graduate student set to graduate from the Graduate School of Arts and Sciences at Lincoln Center in 2026.

Related Posts

Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort

July 22, 2025

U.S. Lawmakers Push Back Against UK’s Demand for an Apple Encryption Backdoor

February 21, 2025

Beyond Goodbye: Safeguarding Employee Data Privacy After Death

February 19, 2025
Privacy
  • Data Privacy FAQs
  • Your Privacy Questions Answered
  • Visions of Privacy
Search
Categories
  • AI (78)
  • CCPA (9)
  • GDPR (20)
  • Higher ED (25)
  • New Jersey Privacy (2)
  • New Jersey Privacy Law (2)
  • New York Privacy Act (7)
  • News (189)
  • Privacy (174)
  • Regulations (65)
Archives

Fordham University - The Jesuit University of New York

Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.
Copyright © Fordham University
Facebook X (Twitter) Instagram YouTube LinkedIn
© 2025 ThemeSphere. Designed by ThemeSphere.

Type above and press Enter to search. Press Esc to cancel.