CVE-2025-10001

WordPress · WordPress plugin: "Import any XML, CSV or Excel File to WordPress"

A high-severity vulnerability has been identified in the "Import any XML, CSV or Excel File to WordPress" plugin.

Executive summary

A high-severity vulnerability has been identified in the "Import any XML, CSV or Excel File to WordPress" plugin. This flaw allows an authenticated attacker to upload malicious files, such as web shells, to a vulnerable website, potentially leading to a complete server compromise, data theft, and website defacement. Organizations using this plugin are at significant risk and should take immediate action to mitigate this threat.

Vulnerability

The vulnerability exists within the file import functionality of the plugin. The application fails to properly validate the file type of user-supplied uploads, a condition known as Unrestricted File Upload. An attacker with privileges to access the import feature can bypass the intended file restrictions (XML, CSV, Excel) and upload a file with a malicious extension, such as a PHP web shell. Once uploaded, the attacker can navigate to the file's location on the server and execute arbitrary code with the permissions of the web server process.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.2. Successful exploitation could lead to a complete compromise of the affected website and potentially the underlying server. The business impact includes, but is not limited to, theft of sensitive data (customer information, user credentials, payment details), website defacement causing significant reputational damage, and the use of the compromised server for malicious activities like hosting phishing sites or distributing malware. The financial and operational costs associated with incident response, system restoration, and customer notification could be substantial.

Remediation

Immediate Action: Immediately update the "Import any XML, CSV or Excel File to WordPress" plugin to the latest patched version provided by the vendor. If the plugin is not critical for business operations, the recommended course of action is to disable and completely remove it from the WordPress installation to eliminate the attack surface.

Proactive Monitoring: Monitor web server and application logs for suspicious file upload attempts, particularly files with executable extensions (.php, .phtml, .sh) being uploaded to unexpected directories. Implement file integrity monitoring on the web server to detect the creation of unauthorized files in the WordPress uploads directory. Network monitoring should be configured to detect unusual outbound connections from the web server, which could indicate a successful compromise.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to inspect file uploads and block malicious file types. Additionally, configure web server permissions to prevent script execution in the uploads directory (e.g., using an .htaccess file or server configuration settings). Regularly scan the web server for malicious files and backdoors.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 7.2) of this vulnerability and the potential for complete system compromise, it is critical that organizations take immediate action. The primary recommendation is to apply the vendor-supplied patch or remove the affected plugin from all WordPress sites without delay. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its nature makes it a prime target for future exploitation. All systems running the vulnerable plugin versions should be considered at high risk and prioritized for remediation.