CVE-2025-10058
WP · WP Import – Ultimate CSV XML Importer for WordPress plugin
A high-severity vulnerability has been discovered in the "WP Import – Ultimate CSV XML Importer" WordPress plugin.
Executive summary
A high-severity vulnerability has been discovered in the "WP Import – Ultimate CSV XML Importer" WordPress plugin. This flaw allows an attacker to delete arbitrary files on the server hosting the website, which could lead to a complete site outage, data loss, and disruption of business operations. Immediate patching is required to mitigate the risk of exploitation.
Vulnerability
The vulnerability exists within the upload_function() of the plugin due to improper validation of file paths. An authenticated attacker with access to the plugin's import functionality can exploit this by crafting a malicious request containing path traversal sequences (e.g., ../../..). This tricks the function into targeting and deleting critical files outside of the intended directory, such as wp-config.php, .htaccess, or other core application files, leading to a denial of service.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.1. Successful exploitation could have a significant negative impact on the business. An attacker could render the entire website inaccessible by deleting configuration or core files, resulting in a denial of service (DoS) that disrupts revenue streams, customer access, and internal operations. The deletion of specific data or media files could lead to permanent data loss, requiring costly restoration from backups and potentially damaging the organization's reputation.
Remediation
Immediate Action: Immediately update the "WP Import – Ultimate CSV XML Importer" plugin to the latest version provided by the vendor, which addresses this vulnerability. If this plugin is not critical for business operations, the recommended course of action is to deactivate and uninstall it to completely remove this attack vector.
Proactive Monitoring: Monitor web server access logs for suspicious POST requests to the plugin's endpoints, specifically looking for file paths that include traversal sequences like ../. Implement a File Integrity Monitoring (FIM) system to generate alerts for any unauthorized or unexpected deletion of critical WordPress core files, theme files, or the wp-config.php file.
Compensating Controls: If patching cannot be performed immediately, implement a Web Application Firewall (WAF) with rules designed to detect and block path traversal attacks. Additionally, enforce strict file system permissions to prevent the web server's user account from deleting files outside of its designated directories. Restricting access to the WordPress administrative dashboard (/wp-admin) to only trusted IP addresses can also reduce the risk of exploitation by authenticated attackers.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score of 8.1 and the potential for a complete denial of service, this vulnerability poses a significant risk to the organization. We strongly recommend that system administrators prioritize the immediate application of the vendor-supplied patch for the "WP Import – Ultimate CSV XML Importer" plugin across all affected websites. If the plugin is not essential, it should be removed as a precautionary measure to reduce the overall attack surface.