Critical vulnerability identified by wordfence

This topic has 4 replies, 3 voices, and was last updated 1 month, 2 weeks ago ago by Tony Rodriguez

  • Avatar: Shafi
    Shafi
    Participant
    January 26, 2026 at 20:26

    Plugin Name: Royal Core
    Current Plugin Version: 1.5.7
    Details: To protect your site from this vulnerability, the safest option is to deactivate and completely remove “Royal Core” until a patched version is available. Get more information.(opens in new tab)
    Vulnerability Information: https://www.wordfence.com/threat-intel/vulnerabilities/id/a6ca0a45-cbb3-419b-a2fd-7427935524d8?source=plugin(opens in new tab)
    Vulnerability Severity: 8.8/10.0 (High)

    Will you solve this issue quickly

    3 Answers
    Avatar: Andrew Mitchell
    Andrew Mitchell
    Support staff
    January 27, 2026 at 10:05

    Hello, Shafi,

    It seems that an error occurred on ThemeForest due to identical plugin names. We do not have a function called royal_restore_backup. In addition, the report refers to a completely different author and developer of the product with the mentioned vulnerability.

    Best regards,
    8Theme Team

    Files is visible for topic creator and
    support staff only.
    Avatar: Shafi
    Shafi
    Participant
    February 13, 2026 at 19:12

    Thanks for the support! My topic “Critical vulnerability identified by wordfence” has been successfully resolved.

    Avatar: Tony Rodriguez
    Tony Rodriguez
    Support staff
    February 13, 2026 at 19:12

    Dear Shafi,

    It’s great having you in our WordPress & WooCommerce community!

    Every insight you share helps us refine XStore and build tools that empower thousands of online store owners worldwide.

    Together, we grow stronger with every release.

    Topic closed.
    The 8Theme Team

  • Viewing 4 results - 1 through 4 (of 4 total)

The issue related to '‘Critical vulnerability identified by wordfence’' has been successfully resolved, and the topic is now closed for further responses

We're using our own and third-party cookies to improve your experience and our website. Keep on browsing to accept our cookie policy.