Skip to main content

CVE-2022-2711: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Unknown Import any XML or CSV File to WordPress

High
VulnerabilityCVE-2022-2711cvecve-2022-2711cwe-22
Published: Mon Nov 07 2022 (11/07/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Import any XML or CSV File to WordPress

Description

The Import any XML or CSV File to WordPress plugin before 3.6.9 is not validating the paths of files contained in uploaded zip archives, allowing highly privileged users, such as admins, to write arbitrary files to any part of the file system accessible by the web server via a path traversal vector.

AI-Powered Analysis

AILast updated: 07/03/2025, 09:25:43 UTC

Technical Analysis

CVE-2022-2711 is a high-severity path traversal vulnerability (CWE-22) found in the WordPress plugin 'Import any XML or CSV File to WordPress' versions prior to 3.6.9. This vulnerability arises because the plugin fails to properly validate the paths of files contained within uploaded ZIP archives. Specifically, highly privileged users such as administrators can exploit this flaw by crafting ZIP files with malicious pathnames that traverse directories outside the intended upload directory. By doing so, they can write arbitrary files to any location on the file system accessible by the web server. This can lead to unauthorized modification or replacement of critical files, potentially enabling remote code execution, privilege escalation, or persistent backdoors. The vulnerability has a CVSS v3.1 base score of 7.2, reflecting its high impact on confidentiality, integrity, and availability. Exploitation requires administrative privileges but does not require user interaction beyond the upload action. No known exploits are currently reported in the wild. The vulnerability was publicly disclosed on November 7, 2022, and affects the plugin version 3.6.9 and earlier. The root cause is insufficient sanitization and validation of file paths within ZIP archives, allowing directory traversal sequences (e.g., '../') to escape the intended extraction directory. This flaw is critical in environments where multiple users have admin access or where admin accounts could be compromised, as it allows attackers to manipulate server files beyond the plugin's scope.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for those relying on WordPress websites with the vulnerable plugin installed. Successful exploitation can lead to unauthorized file writes, enabling attackers to implant malicious scripts, deface websites, or disrupt services. This compromises the confidentiality and integrity of web content and potentially the availability of the website if critical files are overwritten or deleted. Given the widespread use of WordPress across Europe for business, government, and e-commerce sites, exploitation could result in data breaches, reputational damage, and regulatory non-compliance under GDPR due to unauthorized data manipulation or exposure. Organizations with multiple administrators or less stringent access controls are at higher risk. Additionally, the ability to write arbitrary files could facilitate further attacks such as web shell deployment, lateral movement within the network, or persistent access, amplifying the threat impact.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately update the 'Import any XML or CSV File to WordPress' plugin to version 3.6.9 or later, where the issue is resolved. If immediate patching is not feasible, restrict plugin usage to trusted administrators only and audit admin accounts for suspicious activity. Implement strict file system permissions to limit the web server's write access to only necessary directories, reducing the impact of arbitrary file writes. Employ web application firewalls (WAFs) with rules to detect and block suspicious ZIP archive uploads or path traversal attempts. Regularly monitor logs for unusual file upload patterns or unexpected file modifications. Additionally, conduct security awareness training for administrators on safe plugin usage and the risks of uploading untrusted files. Finally, consider isolating WordPress instances in containerized or sandboxed environments to limit potential damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-08-08T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdad57

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/3/2025, 9:25:43 AM

Last updated: 8/10/2025, 12:47:36 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats