CVE-2025-13066
WordPress · WordPress Demo Importer Plus plugin
A high-severity vulnerability has been identified in the Demo Importer Plus plugin for WordPress, affecting all versions up to and including version 2.
Executive summary
A high-severity vulnerability has been identified in the Demo Importer Plus plugin for WordPress, affecting all versions up to and including version 2. This flaw allows an attacker to upload arbitrary files to the server, which could lead to a complete compromise of the affected website. Successful exploitation could result in data theft, website defacement, or the server being used for malicious activities.
Vulnerability
The Demo Importer Plus plugin for WordPress is vulnerable to arbitrary file upload due to insufficient validation of user-supplied files. An unauthenticated or authenticated attacker (depending on the specific access controls of the vulnerable function) could upload a malicious script, such as a PHP web shell, disguised as a legitimate file. Once uploaded, the attacker could navigate to the file's location on the server to execute it, granting them remote code execution capabilities and potentially full control over the web server.
Business impact
This vulnerability is rated as high severity with a CVSS score of 8.8, posing a significant risk to the organization. A successful exploit could lead to a complete system compromise, resulting in severe business consequences. These include the theft of sensitive data such as customer information and user credentials, financial loss, significant reputational damage, and potential legal or regulatory penalties. An attacker could also deface the website, disrupt business operations, or use the compromised server as a launchpad for further attacks against other internal or external systems.
Remediation
Immediate Action: Immediately update the Demo Importer Plus plugin to the latest version available (a version greater than 2) which contains a patch for this vulnerability. If the plugin is not essential for business operations, the recommended course of action is to deactivate and completely remove it to eliminate the attack surface.
Proactive Monitoring: Monitor web server access logs for unusual POST requests to plugin-related endpoints, especially those involving file uploads. Implement a File Integrity Monitoring (FIM) solution to alert on any unauthorized file modifications or additions within the WordPress installation directories, particularly the wp-content/uploads folder. Scrutinize outbound network traffic from the web server for any suspicious connections, which could indicate a successful compromise.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules specifically designed to inspect and block malicious file uploads (e.g., blocking files with extensions like .php, .phtml). Additionally, harden the web server by disabling PHP execution in directories where uploads are stored.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score of 8.8 and the critical impact of a successful exploit, immediate remediation is strongly recommended. Organizations using the Demo Importer Plus plugin should prioritize updating to a patched version without delay. Due to the high likelihood of future exploitation, all systems running a vulnerable version should be considered at high risk. Proactive monitoring should be implemented to detect any potential attempts at exploitation.