Theme Vulnerability Hub
Theme 9 known issues Latest disclosed Sep 26, 2025

TheGem Vulnerabilities

Review known vulnerability records for the WordPress theme TheGem (`thegem`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2025-60097, CVE-2025-62011 and CVE-2025-4317, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
9
High or Critical
1
Patch Coverage
100%
Last Updated
Feb 26, 2026
Priority CVE Quick Links

Fast paths into TheGem CVE reports

Start with the highest-signal CVE records for this WordPress theme before scanning the full vulnerability feed.

Indexed CVEs
9
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for TheGem so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
9 records include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
0 critical and 1 high severity finding.
Recent CVEs
CVE-2025-60097, CVE-2025-62011 and CVE-2025-4317
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for TheGem

Sorted by latest disclosure date so newly published issues surface first.

Theme Medium Patched: Yes CVE-2025-60097
CVE-2025-60097: TheGem <= 5.10.5 - Missing Authorization

The TheGem theme for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 5.10.5. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform an unauthorized act...

Published
Sep 26, 2025
Patched Release
5.10.5.1
Affected Versions
Versions up to 5.10.5
Next Step
Update to 5.10.5.1 or newer if supported.
Theme Medium Patched: Yes CVE-2025-62011
CVE-2025-62011: TheGem <= 5.10.5 - Authenticated (Subscriber+) Stored Cross-Site Scripting

The TheGem theme for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 5.10.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject a...

Published
Sep 03, 2025
Patched Release
5.10.5.1
Affected Versions
Versions up to 5.10.5
Next Step
Update to 5.10.5.1 or newer if supported.
Theme High Patched: Yes CVE-2025-4317
CVE-2025-4317: TheGem <= 5.10.3 - Authenticated (Subscriber+) Arbitrary File Upload

The TheGem theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the thegem_get_logo_url() function in all versions up to, and including, 5.10.3. This makes it possible for authenticated attackers, with Subscriber-level access and abov...

Published
May 12, 2025
Patched Release
5.10.3.1
Affected Versions
Versions up to 5.10.3
Next Step
Update to 5.10.3.1 or newer if supported.
Theme Medium Patched: Yes CVE-2025-4339
CVE-2025-4339: TheGem <= 5.10.3 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Theme Options Update

The TheGem theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajaxApi() function in all versions up to, and including, 5.10.3. This makes it possible for authenticated attackers, with Subscriber-level access and above,...

Published
May 12, 2025
Patched Release
5.10.3.1
Affected Versions
Versions up to 5.10.3
Next Step
Update to 5.10.3.1 or newer if supported.
Theme Medium Patched: Yes CVE-2023-50892
CVE-2023-50892: TheGem <= 5.9.1 - Reflected Cross-Site Scripting

The TheGem theme for WordPress is vulnerable to Reflected Cross-Site Scripting via an unknown parameter in all versions up to, and including, 5.9.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary...

Published
Dec 26, 2023
Patched Release
5.9.2
Affected Versions
Versions up to 5.9.1
Next Step
Update to 5.9.2 or newer if supported.
Theme Medium Patched: Yes CVE-2023-32237
CVE-2023-32237: TheGem < 5.8.1.1 - Authenticated (Subscriber+) Stored Cross-Site Scripting

The TheGem theme for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to 5.8.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with subscriber-level permissions and above to inject arbitrary web...

Published
May 05, 2023
Patched Release
5.8.1.1
Affected Versions
Versions before 5.8.1.1
Next Step
Update to 5.8.1.1 or newer if supported.
Theme Medium Patched: Yes CVE-2023-32238
CVE-2023-32238: TheGem < 5.8.1.1 - Improper Authentication

The TheGem theme for WordPress is vulnerable to improper authentication in versions up to 5.8.1.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform an unknown action.

Published
May 05, 2023
Patched Release
5.8.1.1
Affected Versions
Versions before 5.8.1.1
Next Step
Update to 5.8.1.1 or newer if supported.
Theme Medium Patched: Yes CVE-2023-32237
CVE-2023-32237: TheGem < 5.8.1.1 - Authenticated (Subscriber+) Stored Cross-Site Scripting

The TheGem theme for WordPress is vulnerable to Stored Cross-Site Scripting via an unknown parameter in versions up to 5.8.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, t...

Published
May 05, 2023
Patched Release
5.8.1.1
Affected Versions
Versions before 5.8.1.1
Next Step
Update to 5.8.1.1 or newer if supported.
Theme Medium Patched: Yes CVE-2023-32238
CVE-2023-32238: TheGem < 5.8.1.1 - Missing Authorization

The TheGem theme for WordPress is vulnerable to unauthorized modification and retrieval of data due to a missing capability check on the ajaxApi() function called via an AJAX action in versions up to 5.8.1.1. This makes it possible for authenticated attackers, with subscriber-lev...

Published
May 05, 2023
Patched Release
5.8.1.1
Affected Versions
Versions before 5.8.1.1
Next Step
Update to 5.8.1.1 or newer if supported.