Browse all 35 CVE security advisories affecting RadiusTheme. AI-powered Chinese analysis, POCs, and references for each vulnerability.
RadiusTheme operates as a software development entity primarily focused on creating WordPress themes and plugins for e-commerce and business websites. Despite its commercial focus, the company has been associated with a significant number of security flaws, currently totaling 34 recorded Common Vulnerabilities and Exposures (CVEs). The vulnerabilities frequently exploited in their products typically involve Cross-Site Scripting (XSS), SQL injection, and Remote Code Execution (RCE), often stemming from insufficient input validation and inadequate sanitization of user-supplied data. Additionally, several incidents highlight issues related to privilege escalation and broken access control, allowing unauthorized users to manipulate site settings or execute malicious scripts. These recurring security deficiencies suggest systemic weaknesses in the development and code review processes. The high volume of CVEs indicates that while the themes are widely used, they have historically posed substantial risks to website integrity and user data security, necessitating rigorous patching and security audits for administrators relying on these assets.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-25026 | WordPress Team plugin <= 5.0.11 - Broken Access Control vulnerability — TeamCWE-862 | 7.5 | High | 2026-03-25 |
| CVE-2026-32396 | WordPress Team plugin <= 5.0.13 - Broken Access Control vulnerability — TeamCWE-862 | 5.3 | Medium | 2026-03-13 |
| CVE-2025-57975 | WordPress Team Plugin <= 5.0.6 - Broken Access Control Vulnerability — TeamCWE-862 | 4.3 | Medium | 2025-09-22 |
This page lists every published CVE security advisory associated with RadiusTheme. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.