Days
:
Hours
:
Minutes
:
Seconds

Ready-to-Use Website Service $510 $395

Get Now
Skip to content Skip to sidebar Skip to footer

ThemeREX Addons Vulnerability Fixed

On February 18, 2020 Wordfence has announced the disclosure of the vulnerability present in some versions of ThemeREX Addons plugin, a required plugin packaged with our themes. Therefore, we wanted to notify our customers about the problem and elaborate on the quick fix.

First and foremost, our themes have different versions of the plugin so only some items were affected. Of course, ThemeREX developers have instantly found the problem and eliminated it. As a result, till February 20, we have successfully updated all the themes in question. In order to check if your theme has the problem, just have a look at the Change log at the bottom of the item description page on Themeforest.net  If you can see “ThemeREX Addons vulnerability fixed” there, then you need to update the theme and the plugin to avoid the exploitation of this vulnerability. 

In order to download the fixed theme version, please navigate to Downloads section of your Themeforest account. The steps to update Themerex Addons plugin in your WordPress admin are:

  1. Download the theme and find the included Themerex Addons plugin using the following path – theme_name/plugins/trx_addons/trx_addons.zip 
  2.  Then navigate to the Dashboard -> Plugins to deactivate and remove the current version of Themerex Addons plugin. 
  3. Upload trx_addons.zip  and activate it.

How to Apply the Fix Yourself

In addition, if you are not willing to update the theme, you may quickly make changes in files yourself. Just follow these steps:

  1. Log in to your Cpanel File Manager or use FTP client to access files on the server.
  2. Remove file wp-content/plugins/trx_addons/includes/plugin.rest-api.php If the file is not in your plugin, then there is no problem at all.
  3. Then, delete the following line of code in wp-content/plugins/trx_addons/trx_addions.php file:
    require_once TRX_ADDONS_PLUGIN_DIR_INCLUDES . ‘plugin.rest-api.php’;

Congrats! You are done now. The vulnerability is successfully defused.

Moreover, our Tech Support Team is ready to help you solve the problem in our Help Desk. All you need is to submit a support ticket. If your support has expired, there is no need to purchase additional support. We will help you free of charge – just provide your website details using  Presales Questions option.

Presales

Once again, take our deepest apologies for any inconvenience caused by this issue. We highly value our customers’ business, effort and time.

For the Updates

Exploring ideas at the intersection of design, code, and technology. Subscribe to our newsletter and always be aware of all the latest updates.

1 Comment

  • Ruben Alamina
    Posted Feb 21, 2020 at 8:08 pm

    I appreciate the post even if it’s late, since your team replied to the vulnerability post on WordFence, which you didn’t even include the post.

    What was at risk, what was compromised, how can we make sure the site is secure after updating the plugin? I ask because I found an admin account that got created as soon as the vulnerability was found so I spent all night replacing files, looking for changes site wide, making a new database, migrating everything over to it, etc.

    This kind of information needs to be really thourough in the future, is not enough to say you had a vulnerability and you fixed it via an update. The site could remain compromised even after updating if no other measure are taken by us and without information on how to proceed about this, it’s a mess and could be potentially big if the site control is taken over from you, for example.

    Thanks for disclosing and I would ask you if possible, to allow customers with a valid (even if not current) purchase code to get in touch with your support for information in an event like this. Using a presales question option is not the right way to do it in my opinion.

Leave a comment

Save your time!

Hire professionals for your project

Download a Free Theme