CVE-2025-11170: CWE-434 Unrestricted Upload of File with Dangerous Type in kddiwebcommunications WP移行専用プラグイン for CPI
The WP移行専用プラグイン for CPI plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the Cpiwm_Import_Controller::import function in all versions up to, and including, 1.0.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-11170 affects the WP移行専用プラグイン for CPI, a WordPress plugin developed by kddiwebcommunications. This plugin suffers from a lack of proper file type validation in the import function (Cpiwm_Import_Controller::import), allowing unauthenticated attackers to upload arbitrary files to the server. Because the plugin does not restrict or verify the file types being uploaded, attackers can upload malicious scripts or executables, potentially leading to remote code execution (RCE). The vulnerability is present in all versions up to and including 1.0.2. The CVSS 3.1 score of 9.8 reflects the critical nature of this flaw: it can be exploited remotely over the network without any authentication or user interaction, and it impacts confidentiality, integrity, and availability of the affected systems. Although no public exploits have been reported yet, the straightforward exploitation path and the common use of WordPress make this a high-risk vulnerability. The CWE-434 classification highlights the core issue as unrestricted file upload, a common vector for web application compromise. The plugin is primarily used for WordPress migration related to CPI hosting services, which may be niche but still relevant for affected users. The lack of available patches at the time of publication necessitates immediate risk mitigation steps.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially those running WordPress sites that utilize the WP移行専用プラグイン for CPI plugin. Successful exploitation could lead to full server compromise, data breaches, defacement, or use of the server as a pivot point for further attacks. Confidential data stored or processed by the affected WordPress sites could be exposed or altered, and service availability could be disrupted by malicious payloads or ransomware. Given the plugin’s role in migration, organizations performing site transitions or backups with this plugin are particularly vulnerable. The impact extends beyond individual sites, as compromised servers can be used to launch attacks on other internal systems or external targets. The critical CVSS score underscores the urgency for European entities to assess their exposure and implement mitigations. Additionally, the lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation attempts.
Mitigation Recommendations
1. Immediately identify and inventory all WordPress installations using the WP移行専用プラグイン for CPI plugin. 2. Disable or remove the plugin until a secure patched version is released. 3. Implement strict file upload validation at the web server or application firewall level, restricting allowed file types and scanning uploads for malicious content. 4. Monitor web server logs and file system changes for suspicious activity indicative of exploitation attempts. 5. Employ web application firewalls (WAFs) with rules targeting arbitrary file upload attempts. 6. Harden WordPress installations by limiting file permissions and disabling execution in upload directories. 7. Educate administrators about the risks of installing unverified plugins and the importance of timely updates. 8. Prepare incident response plans to quickly address potential compromises stemming from this vulnerability. 9. Follow vendor communications for patch releases and apply updates promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-11170: CWE-434 Unrestricted Upload of File with Dangerous Type in kddiwebcommunications WP移行専用プラグイン for CPI
Description
The WP移行専用プラグイン for CPI plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the Cpiwm_Import_Controller::import function in all versions up to, and including, 1.0.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-11170 affects the WP移行専用プラグイン for CPI, a WordPress plugin developed by kddiwebcommunications. This plugin suffers from a lack of proper file type validation in the import function (Cpiwm_Import_Controller::import), allowing unauthenticated attackers to upload arbitrary files to the server. Because the plugin does not restrict or verify the file types being uploaded, attackers can upload malicious scripts or executables, potentially leading to remote code execution (RCE). The vulnerability is present in all versions up to and including 1.0.2. The CVSS 3.1 score of 9.8 reflects the critical nature of this flaw: it can be exploited remotely over the network without any authentication or user interaction, and it impacts confidentiality, integrity, and availability of the affected systems. Although no public exploits have been reported yet, the straightforward exploitation path and the common use of WordPress make this a high-risk vulnerability. The CWE-434 classification highlights the core issue as unrestricted file upload, a common vector for web application compromise. The plugin is primarily used for WordPress migration related to CPI hosting services, which may be niche but still relevant for affected users. The lack of available patches at the time of publication necessitates immediate risk mitigation steps.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially those running WordPress sites that utilize the WP移行専用プラグイン for CPI plugin. Successful exploitation could lead to full server compromise, data breaches, defacement, or use of the server as a pivot point for further attacks. Confidential data stored or processed by the affected WordPress sites could be exposed or altered, and service availability could be disrupted by malicious payloads or ransomware. Given the plugin’s role in migration, organizations performing site transitions or backups with this plugin are particularly vulnerable. The impact extends beyond individual sites, as compromised servers can be used to launch attacks on other internal systems or external targets. The critical CVSS score underscores the urgency for European entities to assess their exposure and implement mitigations. Additionally, the lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation attempts.
Mitigation Recommendations
1. Immediately identify and inventory all WordPress installations using the WP移行専用プラグイン for CPI plugin. 2. Disable or remove the plugin until a secure patched version is released. 3. Implement strict file upload validation at the web server or application firewall level, restricting allowed file types and scanning uploads for malicious content. 4. Monitor web server logs and file system changes for suspicious activity indicative of exploitation attempts. 5. Employ web application firewalls (WAFs) with rules targeting arbitrary file upload attempts. 6. Harden WordPress installations by limiting file permissions and disabling execution in upload directories. 7. Educate administrators about the risks of installing unverified plugins and the importance of timely updates. 8. Prepare incident response plans to quickly address potential compromises stemming from this vulnerability. 9. Follow vendor communications for patch releases and apply updates promptly once available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-29T17:18:31.768Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6912b12e14bc3e00ba783c9a
Added to database: 11/11/2025, 3:44:46 AM
Last enriched: 11/18/2025, 4:20:26 AM
Last updated: 12/27/2025, 8:33:49 PM
Views: 125
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14177: CWE-125 Out-of-bounds Read in PHP Group PHP
MediumCVE-2025-14180: CWE-476 NULL Pointer Dereference in PHP Group PHP
HighCVE-2025-14178: CWE-787 Out-of-bounds Write in PHP Group PHP
MediumCVE-2025-15109: Unrestricted Upload in jackq XCMS
MediumCVE-2025-15108: Use of Hard-coded Cryptographic Key in PandaXGO PandaX
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.