CVE-2023-4521: CWE-94 Improper Control of Generation of Code ('Code Injection') in Unknown Import XML and RSS Feeds
The Import XML and RSS Feeds WordPress plugin before 2.1.5 contains a web shell, allowing unauthenticated attackers to perform RCE. The plugin/vendor was not compromised and the files are the result of running a PoC for a previously reported issue (https://wpscan.com/vulnerability/d4220025-2272-4d5f-9703-4b2ac4a51c42) and not deleting the created files when releasing the new version.
AI Analysis
Technical Summary
CVE-2023-4521 is a critical vulnerability affecting the WordPress plugin 'Import XML and RSS Feeds' version 2.1.4 and earlier. The vulnerability is categorized under CWE-94, which relates to improper control of code generation, specifically code injection. This plugin contains a web shell that allows unauthenticated attackers to execute remote code execution (RCE) on affected WordPress installations. The root cause stems from leftover files created during the proof-of-concept (PoC) testing of a previously reported issue. These files were not removed prior to releasing the fixed version 2.1.5, resulting in the persistence of a backdoor-like web shell. The vulnerability requires no authentication or user interaction, making exploitation straightforward over the network. The CVSS v3.1 base score is 9.8, reflecting the critical nature of the flaw with network attack vector, low attack complexity, no privileges required, and full impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the presence of a web shell implies that once exploited, attackers can gain full control over the affected WordPress environment, potentially leading to data theft, site defacement, malware distribution, or pivoting to internal networks. The vendor/project is unknown, but the plugin is publicly available and used in WordPress ecosystems, which are widely deployed globally including Europe.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites that utilize the 'Import XML and RSS Feeds' plugin. Successful exploitation can lead to complete compromise of the web server hosting the WordPress instance, resulting in unauthorized data access, defacement, or use of the server as a launchpad for further attacks within the organization's network. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance under GDPR due to potential data breaches. Given the ease of exploitation and the critical impact on confidentiality, integrity, and availability, organizations with public-facing WordPress sites are particularly vulnerable. Sectors such as government, finance, media, and e-commerce in Europe, which often use WordPress for content management, could face severe operational and financial consequences if targeted. Additionally, the lack of authentication requirement means automated scanning and exploitation attempts could be widespread, increasing the attack surface.
Mitigation Recommendations
1. Immediate upgrade: Organizations should promptly update the 'Import XML and RSS Feeds' plugin to version 2.1.5 or later, where the web shell files have been removed. 2. Manual verification: Since the issue involves leftover PoC files, administrators should manually inspect the WordPress plugin directories for any suspicious or unknown PHP files that could act as backdoors and remove them. 3. Webshell detection: Employ specialized webshell detection tools or scripts to scan the web server for malicious code artifacts. 4. Access controls: Restrict write permissions on plugin directories to prevent unauthorized file creation or modification. 5. Monitoring and logging: Enable detailed logging and monitor for unusual web requests or execution patterns indicative of exploitation attempts. 6. Network segmentation: Isolate web servers from critical internal networks to limit lateral movement if compromise occurs. 7. Backup and recovery: Maintain regular, secure backups of WordPress sites to enable rapid restoration in case of compromise. 8. Security plugins: Deploy WordPress security plugins that can detect and block malicious activities related to plugin vulnerabilities. 9. Incident response readiness: Prepare incident response plans specifically addressing webshell detection and removal. These steps go beyond generic advice by focusing on the unique nature of this vulnerability involving leftover PoC files and the presence of a web shell.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2023-4521: CWE-94 Improper Control of Generation of Code ('Code Injection') in Unknown Import XML and RSS Feeds
Description
The Import XML and RSS Feeds WordPress plugin before 2.1.5 contains a web shell, allowing unauthenticated attackers to perform RCE. The plugin/vendor was not compromised and the files are the result of running a PoC for a previously reported issue (https://wpscan.com/vulnerability/d4220025-2272-4d5f-9703-4b2ac4a51c42) and not deleting the created files when releasing the new version.
AI-Powered Analysis
Technical Analysis
CVE-2023-4521 is a critical vulnerability affecting the WordPress plugin 'Import XML and RSS Feeds' version 2.1.4 and earlier. The vulnerability is categorized under CWE-94, which relates to improper control of code generation, specifically code injection. This plugin contains a web shell that allows unauthenticated attackers to execute remote code execution (RCE) on affected WordPress installations. The root cause stems from leftover files created during the proof-of-concept (PoC) testing of a previously reported issue. These files were not removed prior to releasing the fixed version 2.1.5, resulting in the persistence of a backdoor-like web shell. The vulnerability requires no authentication or user interaction, making exploitation straightforward over the network. The CVSS v3.1 base score is 9.8, reflecting the critical nature of the flaw with network attack vector, low attack complexity, no privileges required, and full impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the presence of a web shell implies that once exploited, attackers can gain full control over the affected WordPress environment, potentially leading to data theft, site defacement, malware distribution, or pivoting to internal networks. The vendor/project is unknown, but the plugin is publicly available and used in WordPress ecosystems, which are widely deployed globally including Europe.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites that utilize the 'Import XML and RSS Feeds' plugin. Successful exploitation can lead to complete compromise of the web server hosting the WordPress instance, resulting in unauthorized data access, defacement, or use of the server as a launchpad for further attacks within the organization's network. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance under GDPR due to potential data breaches. Given the ease of exploitation and the critical impact on confidentiality, integrity, and availability, organizations with public-facing WordPress sites are particularly vulnerable. Sectors such as government, finance, media, and e-commerce in Europe, which often use WordPress for content management, could face severe operational and financial consequences if targeted. Additionally, the lack of authentication requirement means automated scanning and exploitation attempts could be widespread, increasing the attack surface.
Mitigation Recommendations
1. Immediate upgrade: Organizations should promptly update the 'Import XML and RSS Feeds' plugin to version 2.1.5 or later, where the web shell files have been removed. 2. Manual verification: Since the issue involves leftover PoC files, administrators should manually inspect the WordPress plugin directories for any suspicious or unknown PHP files that could act as backdoors and remove them. 3. Webshell detection: Employ specialized webshell detection tools or scripts to scan the web server for malicious code artifacts. 4. Access controls: Restrict write permissions on plugin directories to prevent unauthorized file creation or modification. 5. Monitoring and logging: Enable detailed logging and monitor for unusual web requests or execution patterns indicative of exploitation attempts. 6. Network segmentation: Isolate web servers from critical internal networks to limit lateral movement if compromise occurs. 7. Backup and recovery: Maintain regular, secure backups of WordPress sites to enable rapid restoration in case of compromise. 8. Security plugins: Deploy WordPress security plugins that can detect and block malicious activities related to plugin vulnerabilities. 9. Incident response readiness: Prepare incident response plans specifically addressing webshell detection and removal. These steps go beyond generic advice by focusing on the unique nature of this vulnerability involving leftover PoC files and the presence of a web shell.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-08-24T15:33:51.246Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf52a8
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/21/2025, 10:10:59 PM
Last updated: 7/31/2025, 11:47:29 PM
Views: 15
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.