CVE-2025-14478

WordPress · WordPress Demo Importer Plus plugin

A high-severity vulnerability has been identified in the Demo Importer Plus plugin for WordPress.

Executive summary

A high-severity vulnerability has been identified in the Demo Importer Plus plugin for WordPress. This flaw, known as an XML External Entity (XXE) injection, could allow an unauthenticated attacker to access and exfiltrate sensitive files from the server's filesystem, such as configuration files containing database credentials. Successful exploitation could lead to a full compromise of the affected website and underlying server.

Vulnerability

The vulnerability exists because the plugin's XML parsing engine does not properly disable the processing of external entities when handling imported demo content. An attacker can exploit this by crafting a malicious XML file and uploading it through the plugin's import functionality. This malicious file can instruct the parser to access local files on the server (e.g., wp-config.php, /etc/passwd) or make network requests to internal or external resources, leading to sensitive information disclosure and potential Server-Side Request Forgery (SSRF).

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.5. The primary business impact is the risk of a significant data breach. An attacker could exfiltrate confidential information, including database credentials, API keys, and internal system configurations. This could lead to a complete site takeover, financial loss, reputational damage, and potential regulatory penalties for non-compliance with data protection standards.

Remediation

Immediate Action: Immediately update the Demo Importer Plus plugin to the latest version provided by the vendor, which addresses this vulnerability. If the plugin is no longer required for business operations, the recommended course of action is to deactivate and completely remove it to eliminate this attack vector.

Proactive Monitoring: Monitor web server access logs for unusual POST requests related to the plugin's XML import functionality. System administrators should also monitor for unexpected outbound network traffic originating from the web server, which could indicate an SSRF attack. File Integrity Monitoring (FIM) systems should be configured to alert on any unauthorized access to critical configuration files.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rulesets designed to detect and block common XXE attack patterns. Additionally, enforce strict file permissions on the web server to limit the files accessible by the web server's user account, potentially reducing the impact of a successful exploit.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given the high severity (CVSS 7.5) and the potential for complete information disclosure, it is strongly recommended that organizations using the affected Demo Importer Plus plugin apply the vendor-supplied patch immediately. Although this vulnerability is not currently listed on the CISA KEV catalog, its critical nature warrants urgent attention. The principle of least privilege should be applied; if the plugin's functionality is not essential, it should be removed to reduce the overall attack surface.