CVE-2025-8417

WordPress · WordPress "Catalog Importer, Scraper & Crawler" plugin

A high-severity vulnerability has been identified in the "Catalog Importer, Scraper & Crawler" plugin for WordPress, affecting all versions up to and including 5.

Executive summary

A high-severity vulnerability has been identified in the "Catalog Importer, Scraper & Crawler" plugin for WordPress, affecting all versions up to and including 5. This flaw allows an attacker to inject and execute malicious code on the server, potentially leading to a complete compromise of the website, data theft, and further network intrusion. Immediate patching is required to mitigate the significant risk of a full system takeover.

Vulnerability

The plugin is vulnerable to PHP Code Injection. This occurs because user-supplied input is not properly sanitized before being processed by a function that can execute code, such as eval() or include(). An unauthenticated attacker can craft a malicious request to the vulnerable component of the plugin, embedding PHP code within the request parameters. When the server processes this request, it executes the attacker's code with the same permissions as the web server, leading to Remote Code Execution (RCE).

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.1. A successful exploit could have a devastating impact on the business. An attacker could gain complete control over the affected website, enabling them to steal sensitive data (including customer information, payment details, and intellectual property), deface the website, install malware or ransomware, or use the compromised server as a pivot point to attack other systems within the corporate network. The potential consequences include significant financial loss, severe reputational damage, and potential regulatory fines for data breaches.

Remediation

Immediate Action:

  • Immediately update the "Catalog Importer, Scraper & Crawler" plugin to the latest patched version on all WordPress instances.
  • If the plugin is not critical for business operations, the recommended course of action is to disable and completely remove it to eliminate this attack vector.

Proactive Monitoring:

  • Review web server access logs for unusual POST or GET requests to the plugin's endpoints, particularly those containing suspicious strings or encoded payloads common in injection attacks (e.g., eval, base64_decode, system).
  • Monitor for any unexpected file modifications or creations within the WordPress installation directories, which could indicate the presence of a web shell.
  • Analyze outbound network traffic from the web server for connections to unusual IP addresses or ports, which could signal a successful compromise.

Compensating Controls:

  • If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with rules specifically designed to block PHP code injection and common remote command execution patterns.
  • Harden the server's PHP configuration to disable potentially dangerous functions such as exec(), shell_exec(), system(), and passthru() if they are not required for application functionality.
  • Implement File Integrity Monitoring (FIM) to provide alerts on unauthorized changes to core WordPress and plugin files.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the high severity (CVSS 8.1) and the critical impact of a Remote Code Execution vulnerability, this issue requires immediate attention. We strongly recommend that all system administrators prioritize the immediate update of the "Catalog Importer, Scraper & Crawler" plugin across all production and development environments. Due to the high probability of future exploitation, organizations should treat this vulnerability as a critical threat and apply the vendor-supplied patch without delay.