betheme-icons-icon-pack-rce

WordPress Betheme “Icons icon-pack” flaw lets an author upload PHP, leading to remote code execution risk and a high-severity data breach vector

What happened

The Betheme WordPress theme contains an arbitrary file upload vulnerability in the upload_icons() workflow, specifically via the Icons icon-pack upload flow. Reported about 21 minutes ago, the issue affects Betheme versions up to and including 28.4 and has been rated severity 8.8, high.

According to the advisory, the theme moves and unzips user-supplied ZIP files into the public uploads directory without validating extracted file types. That means an authenticated user with author-level access or higher can upload a crafted ZIP containing PHP or other executable files and achieve remote code execution on the site, via the icon-pack upload step.

Who was affected has not been disclosed beyond the product and versions listed, and there’s no public confirmation here that the flaw has been exploited in the wild. The core technical vector — ZIP extraction into a public document root without type checks — is explicit in the report and is the sticky detail to hunt for in your environment: Betheme, upload_icons, Icons icon-pack.

Why this matters to businesses

If you run WordPress with Betheme, this is a direct operational risk. An attacker with a compromised or misused author account can escalate to full site takeover, implant web shells, pivot to other systems on the same host and harvest customer or CMS-stored data.

For organisations that host client sites, run ecommerce, store user records or handle payments via a WordPress front end, the fallout can be immediate: downtime while you clean up, forensic costs, possible regulator notification and lost customer trust. Given how many agencies reuse themes and shared hosting, supplier blind spots suddenly look expensive.

Also, while dev teams like to promise frictionless content workflows, treating author-level accounts as effectively privileged is a classic mistake, just waiting for a theme bug to make it obvious.

If you’ve got the same weakness, here’s what happens next

First, an attacker who can upload PHP can create a web shell and maintain quiet persistence while they harvest credentials or deploy further tools. Then, if the host runs other sites or services, lateral moves are possible, and cleanup can take days of expensive forensics and restore work.

Second, stolen admin sessions or exfiltrated database dumps mean fraud and regulatory headaches later, not just a few hours of downtime. Recovery costs rise fast when you factor in legal advice, notifications and possible contract penalties.

Finally, defenders who only think in terms of theme updates rather than access control and upload sanitisation will see the same hole reappear elsewhere, like a weed in a badly tended patch.

What to do on Monday morning

Do these eight things, in roughly this order.

  • Identify exposure: inventory WordPress sites running Betheme and flag any instance at version 28.4 or earlier as vulnerable.

  • Restrict uploads: disable the Icons icon-pack upload feature if you can, or restrict author-level account upload privileges until the site is patched.

  • Hunt for shells: scan wp-content/uploads and webroot for recently added PHP or unexpected file types, check modified timestamps and webserver logs for suspicious POSTs to icon-upload endpoints.

  • Rotate and restrict accounts: reset credentials for author and administrator users, force reauthentication and remove unused author accounts.

  • Contain and back up: take affected sites offline if you suspect compromise, preserve forensic images, and ensure backups are isolated before any restore.

  • Apply fixes: install the vendor patch if available, or update the theme beyond the affected range as soon as a trusted update exists; don’t rely on third-party nulled themes for fixes.

  • Harden file handling: enforce server-side file-type checks, remove execute permission from uploads folders and adjust webserver rules to block execution from upload locations.

  • Improve monitoring: add alerting for suspicious file uploads, unexpected PHP execution in uploads and new administrator creations.

Where ISO standards fit, without the sales pitch

An ISO-style information security management system helps here by requiring you know which themes and plugins are in use and by embedding supplier and patch management into routine risk reviews. For a practical ISO framework, see ISO 27001 guidance that maps straight to inventory, patching and access control actions you need now.

When a site outage or compromise forces an emergency restore, a business continuity process cuts recovery time and prevents sloppy restores from reintroducing backdoors. Practical BCMS steps are covered at Synergos on ISO 22301.

For baseline certification and supplier assurance that helps reduce simple mistakes like improper upload handling, see IASME as a sensible starting point for small and medium teams.

Wrap-up

This Betheme Icons icon-pack flaw is a reminder that web UX features that accept ZIP uploads are attack surface, not convenience. If you run Betheme, treat author accounts as privileged, hunt for unexpected PHP in uploads and plan to harden upload handling across your WordPress estate.

Share This Post:

Facebook
Twitter
LinkedIn
Pinterest
Email
WhatsApp
Picture of Adam Cooke
Adam Cooke
As the Operations and Compliance Manager, Adam oversees all aspects of the business, ensuring operational efficiency and regulatory compliance. Committed to high standards, he ensures everyone is heard and supported. With a strong background in the railway industry, Adam values rigorous standards and safety. Outside of work, he enjoys dog walking, gardening, and exploring new places and cuisines.
What our clients say:
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue