CVE-2025-11755: CWE-434 Unrestricted Upload of File with Dangerous Type in wpdelicious WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes)
The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file uploads when importing recipes via CSV in all versions up to, and including, 1.9.0. This flaw allows an attacker with at least Contributor-level permissions to upload a malicious PHP file by providing a remote URL during a recipe import process, leading to Remote Code Execution (RCE).
AI Analysis
Technical Summary
CVE-2025-11755 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the WP Delicious – Recipe Plugin for Food Bloggers, a WordPress plugin used for managing and importing recipe content. The vulnerability exists in the CSV import functionality, which improperly validates file uploads when importing recipes. An attacker with at least Contributor-level permissions can supply a remote URL pointing to a malicious PHP file during the import process. Due to insufficient validation and sanitization of uploaded files, the plugin allows this file to be saved on the server with executable permissions. This leads to remote code execution (RCE), enabling the attacker to execute arbitrary commands on the web server. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with an attack vector of network, low attack complexity, and no user interaction required. The scope is unchanged but impacts confidentiality, integrity, and availability severely. The flaw affects all versions up to and including 1.9.0 of the plugin. No patches or fixes are currently linked, and no known exploits have been reported in the wild, but the risk remains significant due to the ease of exploitation by authenticated users. This vulnerability can lead to full site compromise, data theft, defacement, or use of the server as a pivot point for further attacks.
Potential Impact
The impact of CVE-2025-11755 is substantial for organizations running WordPress sites with the vulnerable WP Delicious plugin. Successful exploitation allows attackers to execute arbitrary code remotely, potentially leading to full server compromise. This can result in unauthorized data access or theft, website defacement, deployment of malware or ransomware, and disruption of services. Since the vulnerability requires only Contributor-level permissions, attackers can leverage compromised or weak user accounts to escalate their privileges and execute attacks. The breach of confidentiality, integrity, and availability can damage organizational reputation, lead to regulatory penalties, and cause financial losses. Additionally, compromised servers may be used as launchpads for attacks against other internal or external targets. The lack of patches increases the urgency for mitigation. Organizations with food blogging, recipe sharing, or related content sites are particularly at risk, but any WordPress site using this plugin is vulnerable.
Mitigation Recommendations
To mitigate CVE-2025-11755, organizations should immediately take the following steps: 1) Disable or uninstall the WP Delicious – Recipe Plugin until a secure patched version is released. 2) Restrict Contributor-level permissions strictly and audit user accounts to remove or limit unnecessary privileges. 3) Implement web application firewalls (WAFs) with rules to detect and block malicious file uploads and suspicious CSV import activities. 4) Monitor server logs for unusual file uploads, especially PHP files in upload directories. 5) Harden the WordPress environment by disabling PHP execution in upload directories via .htaccess or server configuration. 6) Regularly back up website data and test restoration procedures. 7) Stay informed about vendor updates and apply patches promptly once available. 8) Conduct security awareness training for site administrators and contributors about the risks of file uploads and privilege misuse. These measures go beyond generic advice by focusing on permission management, environment hardening, and proactive monitoring tailored to this vulnerability's exploitation vector.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2025-11755: CWE-434 Unrestricted Upload of File with Dangerous Type in wpdelicious WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes)
Description
The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file uploads when importing recipes via CSV in all versions up to, and including, 1.9.0. This flaw allows an attacker with at least Contributor-level permissions to upload a malicious PHP file by providing a remote URL during a recipe import process, leading to Remote Code Execution (RCE).
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11755 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the WP Delicious – Recipe Plugin for Food Bloggers, a WordPress plugin used for managing and importing recipe content. The vulnerability exists in the CSV import functionality, which improperly validates file uploads when importing recipes. An attacker with at least Contributor-level permissions can supply a remote URL pointing to a malicious PHP file during the import process. Due to insufficient validation and sanitization of uploaded files, the plugin allows this file to be saved on the server with executable permissions. This leads to remote code execution (RCE), enabling the attacker to execute arbitrary commands on the web server. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with an attack vector of network, low attack complexity, and no user interaction required. The scope is unchanged but impacts confidentiality, integrity, and availability severely. The flaw affects all versions up to and including 1.9.0 of the plugin. No patches or fixes are currently linked, and no known exploits have been reported in the wild, but the risk remains significant due to the ease of exploitation by authenticated users. This vulnerability can lead to full site compromise, data theft, defacement, or use of the server as a pivot point for further attacks.
Potential Impact
The impact of CVE-2025-11755 is substantial for organizations running WordPress sites with the vulnerable WP Delicious plugin. Successful exploitation allows attackers to execute arbitrary code remotely, potentially leading to full server compromise. This can result in unauthorized data access or theft, website defacement, deployment of malware or ransomware, and disruption of services. Since the vulnerability requires only Contributor-level permissions, attackers can leverage compromised or weak user accounts to escalate their privileges and execute attacks. The breach of confidentiality, integrity, and availability can damage organizational reputation, lead to regulatory penalties, and cause financial losses. Additionally, compromised servers may be used as launchpads for attacks against other internal or external targets. The lack of patches increases the urgency for mitigation. Organizations with food blogging, recipe sharing, or related content sites are particularly at risk, but any WordPress site using this plugin is vulnerable.
Mitigation Recommendations
To mitigate CVE-2025-11755, organizations should immediately take the following steps: 1) Disable or uninstall the WP Delicious – Recipe Plugin until a secure patched version is released. 2) Restrict Contributor-level permissions strictly and audit user accounts to remove or limit unnecessary privileges. 3) Implement web application firewalls (WAFs) with rules to detect and block malicious file uploads and suspicious CSV import activities. 4) Monitor server logs for unusual file uploads, especially PHP files in upload directories. 5) Harden the WordPress environment by disabling PHP execution in upload directories via .htaccess or server configuration. 6) Regularly back up website data and test restoration procedures. 7) Stay informed about vendor updates and apply patches promptly once available. 8) Conduct security awareness training for site administrators and contributors about the risks of file uploads and privilege misuse. These measures go beyond generic advice by focusing on permission management, environment hardening, and proactive monitoring tailored to this vulnerability's exploitation vector.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-14T18:26:47.197Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6905ae02e1b1aafea8d7ec81
Added to database: 11/1/2025, 6:51:46 AM
Last enriched: 2/27/2026, 7:18:03 PM
Last updated: 3/25/2026, 3:10:01 AM
Views: 108
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.