Skip to main content

CVE-2023-4724: CWE-94 Improper Control of Generation of Code ('Code Injection') in Unknown Export any WordPress data to XML/CSV

High
VulnerabilityCVE-2023-4724cvecve-2023-4724cwe-94
Published: Mon Dec 18 2023 (12/18/2023, 20:08:04 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Export any WordPress data to XML/CSV

Description

The Export any WordPress data to XML/CSV WordPress plugin before 1.4.0, WP All Export Pro WordPress plugin before 1.8.6 does not validate and sanitise the `wp_query` parameter which allows an attacker to run arbitrary command on the remote server

AI-Powered Analysis

AILast updated: 07/03/2025, 14:42:52 UTC

Technical Analysis

CVE-2023-4724 is a high-severity vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects the WordPress plugin "Export any WordPress data to XML/CSV" (including the WP All Export Pro variant) in versions prior to 1.4.0 and 1.8.6 respectively. The root cause is the lack of proper validation and sanitization of the `wp_query` parameter. This parameter is used to construct queries for exporting WordPress data, but due to insufficient input controls, an attacker can inject arbitrary code that the server executes. The vulnerability allows remote code execution (RCE) on the affected server without requiring user interaction, but it does require the attacker to have some level of privileges (PR:H in CVSS vector indicates high privileges are needed). The CVSS score of 7.2 reflects a high impact on confidentiality, integrity, and availability, as an attacker could execute arbitrary commands, potentially leading to data theft, data manipulation, or full system compromise. No public exploits are currently known in the wild, but the vulnerability is publicly disclosed and documented by WPScan and CVE databases. The plugin is widely used for exporting WordPress data into XML or CSV formats, making it a critical component in many WordPress installations that rely on data export functionality. The vulnerability's exploitation could allow attackers to bypass typical WordPress security controls and execute commands at the server level, which is a significant risk for hosting environments and websites using this plugin.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. Many businesses and institutions in Europe use WordPress as their content management system, and plugins like "Export any WordPress data to XML/CSV" are popular for data management and reporting tasks. Exploitation could lead to unauthorized access to sensitive data, including personal data protected under GDPR, leading to regulatory fines and reputational damage. Additionally, attackers could leverage this vulnerability to deploy malware, ransomware, or pivot to other internal systems, causing operational disruption. The high integrity and availability impact means critical websites or services could be defaced, taken offline, or manipulated, affecting customer trust and business continuity. Given the requirement for high privileges, the threat is more likely to come from insiders or attackers who have compromised lower-level credentials first, emphasizing the need for layered security. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits rapidly after disclosure.

Mitigation Recommendations

1. Immediate update of the affected WordPress plugins to versions 1.4.0 or later for "Export any WordPress data to XML/CSV" and 1.8.6 or later for WP All Export Pro, where the vulnerability is patched. 2. If updating is not immediately possible, disable the plugin or restrict access to the export functionality to trusted administrators only. 3. Implement strict input validation and sanitization on all user-controllable parameters, especially `wp_query`, to prevent injection attacks. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the vulnerable parameter. 5. Monitor server logs for unusual command execution patterns or unexpected queries related to the export plugin. 6. Enforce the principle of least privilege for WordPress users, ensuring that only necessary users have high-level privileges that could be exploited. 7. Regularly audit and scan WordPress installations for outdated plugins and known vulnerabilities using automated tools. 8. Backup critical data regularly and ensure backups are stored securely offline to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-09-01T17:19:21.190Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeac93

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/3/2025, 2:42:52 PM

Last updated: 7/25/2025, 11:50:20 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats