Skip to main content
Security 12 December 2025 8 min read

170 WordPress Vulnerabilities in One Week, 91 With No Patch

SolidWP disclosed 170 WordPress vulnerabilities on 10 December 2025. Four were critical RCE and file upload flaws affecting 2.3 million sites. Ninety-one had no patch. Here's what to update, what to deactivate, and how to build long-term resilience.

MM
Mark McNeece Founder & Managing Director, 365i
A WordPress dashboard showing a long list of plugin update notifications with red security warning badges

SolidWP's weekly vulnerability report for 10 December 2025 listed 170 WordPress flaws in a single disclosure. Three were critical remote code execution and file upload vulnerabilities. Ninety-one had no patch available at the time of reporting. The affected plugins run on over 2.3 million sites collectively.

That's not a typo. 170 in one week. And more than half of them couldn't be fixed because the developers hadn't released updates yet.

Here's what was found, which plugins you need to check, and what to do about the ones that can't be patched.

The Four Critical Flaws

Four vulnerabilities scored 9.0+ on the CVSS scale, meaning they could be exploited remotely with no authentication required. If you run any of these plugins, stop reading and update them first.

Critical vulnerabilities (CVSS 9.0+) from the 10 December 2025 disclosure
Plugin CVE Active Sites Issue Fixed In
Starter Templates CVE-2025-13065 2,000,000+ Arbitrary file upload 4.4.42
ACF Extended CVE-2025-13486 100,000+ Remote code execution 0.9.2
SureMail SMTP CVE-2025-13516 200,000+ File upload via email handler 1.9.1
10Web Booster CVE-2025-13377 90,000+ Critical file deletion 2.32.11

The Starter Templates vulnerability is the most concerning. Two million sites use this plugin, and the flaw allows anyone to upload PHP files directly to the server. That's full site takeover with a single HTTP request. The December 2025 security roundup we published the previous week covered four other critical vulnerabilities under active exploitation, making this a particularly rough month for WordPress security.

Bar chart showing vulnerability severity breakdown: 4 critical, 15 high, 72 medium, 79 low
Severity distribution across the 170 disclosed vulnerabilities.

Fifteen High-Severity Vulnerabilities

Below the critical tier, fifteen plugins had high-severity issues (CVSS 7.0-8.9). These typically need some form of authentication to exploit, but in WordPress that often just means having a subscriber-level account, which is trivial to create on most sites.

The affected plugins include some of the most popular in the ecosystem:

  • Custom Post Type UI (1,000,000+ sites): broken access control allowing unauthorised settings changes
  • Autoptimize (900,000+ sites): broken access control in cache management
  • Fluent Forms (600,000+ sites): subscriber-level data access via broken access control
  • Beaver Builder (500,000+ sites): two access control flaws, patched in 2.9.4.1
  • Elementor (released security fixes in 3.33.4)
  • Kadence WooCommerce Email Designer (XSS patched in 1.5.18)

Broken access control accounted for 40% of high-severity issues this week. That's a pattern we see repeatedly in WordPress plugins: developers build the feature first and add permission checks later, or not at all.

The 91 Unpatched Vulnerabilities

Here's the part that should concern every WordPress site owner: 91 of these 170 vulnerabilities had no available patch at the time SolidWP published the report.

That's 53% with no fix. The highest-profile unpatched issue affected Happy Addons for Elementor, which runs on over 400,000 sites. A broken access control vulnerability lets lower-privileged users perform actions they shouldn't be able to.

"The number of reported plugin vulnerabilities has increased over 150% since 2022. The WordPress ecosystem's security problem isn't getting worse because attackers are getting smarter. It's getting worse because the plugin ecosystem grows faster than security review can keep up."

Chloe Chamberland, 2023 Annual Security Report, Wordfence Threat Intelligence Lead

That observation landed differently when I was looking at 91 unpatched vulnerabilities in a single weekly report. Running a managed WordPress hosting platform means we see this from both sides: the volume of patches that need applying and the sites that fall behind. It's a race that site owners are losing, and the finish line keeps moving further away.

Pie chart showing 91 unpatched (53%) versus 79 patched (47%) vulnerabilities from the December 10 disclosure
More than half the disclosed vulnerabilities had no fix available at the time of reporting.

What to Do Right Now

If you manage WordPress sites, here's a priority checklist. Do the critical updates first, then work down the list.

Priority 1: Critical updates (do these today)

  • Update Starter Templates to version 4.4.42 or later
  • Update ACF Extended to version 0.9.2 or later
  • Update SureMail SMTP to version 1.9.1 or later
  • Update 10Web Booster to version 2.32.11 or later

Priority 2: High-severity patches

  • Update Beaver Builder to 2.9.4.1
  • Update Elementor to 3.33.4
  • Update Kadence WooCommerce Email Designer to 1.5.18
  • Check Custom Post Type UI, Autoptimize, and Fluent Forms for updates

Priority 3: Unpatched plugin assessment

  • Check if Happy Addons for Elementor has released a fix (it was unpatched at disclosure)
  • For any unpatched plugin with fewer than 10,000 active installs, consider deactivating it until a patch ships
  • For widely-used unpatched plugins, monitor the developer's GitHub or support forum for update announcements

Priority 4: General hardening

  • Audit your server access logs for suspicious POST requests to plugin directories
  • Verify your hosting security includes a web application firewall (WAF)
  • Test site functionality after applying updates, ideally on a staging environment first
  • Run your site through an HTTP header security check to confirm headers like HSTS and CSP are in place

Running a Plugin Security Audit

A weekly vulnerability count this high is a good prompt to audit your entire plugin list. Most WordPress sites accumulate plugins over time, and many stay installed long after they're needed.

"Every plugin is an entry point. The most secure WordPress site is one that uses the fewest plugins necessary to achieve its goals."

Sucuri, 2024 Hacked Website Report

I've seen this in practice with client sites over and over. The sites that get compromised almost always have 30+ plugins installed, half of which the site owner forgot were even there. A lean plugin stack isn't just about performance (though WordPress 6.9's speed improvements make that matter more than ever). It's about reducing the number of doors an attacker can try.

A WordPress plugins page showing a security audit being performed, with plugins marked as safe, needs update, or deactivate
A regular plugin audit identifies abandoned, redundant, and vulnerable plugins before they become attack vectors.

Why 170 Vulnerabilities in One Week?

WordPress powers 43% of the web. There are over 60,000 plugins in the official directory. The sheer volume of code means that vulnerability disclosures at this scale aren't an anomaly anymore. They're becoming normal.

Several factors drive the trend:

  • More researchers, better tools. Automated scanning tools like PHPStan, Semgrep, and commercial SAST solutions find vulnerabilities that manual code review would miss.
  • Coordinated disclosure programmes. Platforms like Wordfence and SolidWP aggregate findings from dozens of researchers, which is why you see large batch disclosures rather than individual reports.
  • Plugin abandonment. Roughly 40% of WordPress plugins haven't been updated in over two years. They still work, but nobody's fixing the security holes researchers find in them.
  • Low barrier to publishing. Anyone can submit a plugin to the WordPress directory. Quality and security reviews happen, but they can't catch everything in 60,000+ plugins.

This isn't a WordPress-specific problem. Any ecosystem with thousands of third-party extensions (browser add-ons, npm packages, mobile app stores) faces similar challenges. But WordPress's market share means the consequences affect more sites than anywhere else.

Building Long-Term Resilience

Patching is reactive. You're always responding to something that's already been found (and possibly exploited). Building resilience means setting up layers of protection so that a single unpatched vulnerability doesn't result in a compromised site. Permission scoping matters just as much as patching: Amazon's Kiro AI tool deleted a live server because it had broader access than the task required.

Here's what that looks like in practice:

Defence-in-depth strategy for WordPress sites
Layer What It Does How to Implement
Web Application Firewall Blocks known attack patterns before they reach WordPress Cloudflare, Sucuri, or host-level WAF
File integrity monitoring Detects unauthorised file changes in real time Wordfence, Sucuri, or server-level monitoring
Automatic daily backups Enables rapid recovery if a site is compromised Host-level backups (our hosting plans include this)
Staging environment Test updates safely before applying to production Host-provided staging or local dev environment
Minimal plugin stack Fewer plugins means fewer potential entry points Quarterly plugin audit, remove unused plugins
PHP version management Current PHP versions receive security patches Upgrade from PHP 8.1 before 31 Dec 2025

Running hosting infrastructure that handles the WAF, backups, and PHP management for you removes three items from that list without any extra work on your part. The plugin audit and staging testing still need human attention, but that's a much smaller task when the infrastructure layer is handled.

We also covered this topic from a different angle on the 365iwebdesign.co.uk blog, where the weekly vulnerability count hit 661 in February 2026, making this December disclosure look modest by comparison.

Frequently Asked Questions

Is 170 WordPress vulnerabilities in one week normal?

Weekly WordPress vulnerability counts have been rising steadily since 2022. Counts of 100-200 per week are becoming common due to more researchers, better scanning tools, and the sheer size of the plugin ecosystem (60,000+ plugins).

What should I do about unpatched vulnerabilities?

For plugins with fewer than 10,000 installs, deactivate them until a patch ships. For widely-used plugins, monitor the developer's update channels and ensure your WAF is active. If a critical vulnerability is unpatched for more than 30 days, find an alternative plugin.

How do I check if my plugins are vulnerable?

Install Wordfence or use the Patchstack vulnerability database to cross-reference your installed plugins. Both services alert you to known vulnerabilities in your specific plugin versions. Also check the SolidWP weekly vulnerability report.

Can I safely update all plugins at once?

For security patches, update critical and high-severity plugins immediately. Test on a staging environment if possible. For non-critical updates, batch them weekly and test afterwards. Always keep a recent backup before bulk-updating.

Does managed hosting protect against plugin vulnerabilities?

Managed hosting adds defence-in-depth layers (WAF, file monitoring, automated backups, PHP updates) that reduce the impact of plugin vulnerabilities. It doesn't prevent vulnerabilities from existing, but it limits the damage and speeds recovery.

How many plugins should a WordPress site have?

There's no magic number, but most well-built sites run 10-15 plugins. Audit quarterly: remove unused plugins, replace multiple single-purpose plugins with one multi-feature alternative, and question whether custom code could replace a plugin entirely.

Will a WAF block exploits for unpatched vulnerabilities?

A WAF blocks known attack patterns and common exploit techniques, which catches many attacks against unpatched vulnerabilities. It's not a guarantee (novel exploits may bypass rules), but it buys you time until a patch ships.

Hosting That Handles Security for You

Daily backups, WAF protection, staging environments, and managed PHP updates. Your site's security shouldn't depend on you remembering to check for patches every week.

Explore Secure Hosting

Sources