Out-of-bounds read vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9
Description
Out-of-bounds read vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A high-severity vulnerability exists in the "WP Delicious – Recipe Plugin for Food Bloggers" for WordPress, identified as CVE-2025-11755. This flaw allows an unauthenticated attacker to upload arbitrary files, including malicious scripts, by exploiting the CSV recipe import feature. Successful exploitation could lead to a complete compromise of the affected website, resulting in data theft, service disruption, and further network intrusion.
Vulnerability Details
CVE-ID: CVE-2025-11755
Affected Software: WP Delicious – Recipe Plugin for Food Bloggers
Affected Versions: All versions up to, and including, 1
Vulnerability: The vulnerability is an arbitrary file upload weakness within the CSV import functionality of the plugin. The import process fails to adequately validate the types of files being uploaded, allowing an attacker to craft a malicious CSV file that includes an executable script (e.g., a PHP web shell). By uploading this file through the recipe import feature, the attacker can place the malicious script onto the web server and subsequently execute it, gaining remote control over the website.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation can lead to significant business disruption and financial loss. An attacker could achieve a full server compromise, leading to consequences such as theft of sensitive data (customer information, user credentials, payment details), website defacement, injection of malware to infect site visitors, or using the compromised server to launch further attacks. Such an incident can cause severe reputational damage, loss of customer trust, and potential legal and regulatory penalties.
Remediation Plan
Immediate Action:
Proactive Monitoring:
Compensating Controls:
Exploitation Status
Public Exploit Available: False
Analyst Notes: As of November 1, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, vulnerabilities of this nature are frequently reverse-engineered by threat actors after a patch is released. The absence of a public exploit does not diminish the risk, and organizations should assume it could be exploited in the near future.
Analyst Recommendation
Given the high severity (CVSS 8.8) and the potential for complete system compromise, immediate remediation is strongly recommended. Organizations must prioritize applying the vendor-supplied patch to all websites using the affected "WP Delicious" plugin. Although this vulnerability is not currently listed on the CISA KEV catalog, its critical nature warrants urgent attention to prevent potential exploitation and protect against data breaches, reputational damage, and operational disruption.