Home

Description

The disable-right-click-powered-by-pixterme through v1.2 and pixter-image-digital-license thtough v1.0 WordPress plugins load a JavaScript file which has been compromised from an apparent abandoned S3 bucket. It can be used as a backdoor by those who control it, but it currently displays an alert marketing security services. Users that pay are added to allowedDomains to suppress the popup.

PUBLISHED Reserved 2025-07-22 | Published 2025-08-14 | Updated 2025-08-14 | Assigner WPScan

Problem types

CWE-829 Inclusion of Functionality from Untrusted Control Sphere

Product status

Default status
affected

Any version
affected

Default status
affected

Any version
affected

Credits

Mike Gozdiskowski finder

WPScan coordinator

References

wpscan.com/...rability/a0c70b98-a3f9-4d4c-a25f-81424230b1a5/ exploit vdb-entry technical-description

cve.org (CVE-2025-8047)

nvd.nist.gov (CVE-2025-8047)

Download JSON