CVE-2025-11755: CWE-434 Unrestricted Upload of File with Dangerous Type in wpdelicious WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes)
The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file uploads when importing recipes via CSV in all versions up to, and including, 1.9.0. This flaw allows an attacker with at least Contributor-level permissions to upload a malicious PHP file by providing a remote URL during a recipe import process, leading to Remote Code Execution (RCE).
AI Analysis
Technical Summary
CVE-2025-11755 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the WP Delicious – Recipe Plugin for Food Bloggers, a WordPress plugin used to manage and import recipes. The vulnerability exists in the recipe import functionality that accepts CSV files. An attacker with at least Contributor-level permissions can exploit this flaw by providing a remote URL pointing to a malicious PHP file during the import process. The plugin fails to properly validate or restrict the file types being uploaded, allowing arbitrary files, including executable PHP scripts, to be uploaded to the server. This leads to Remote Code Execution (RCE), enabling the attacker to execute arbitrary commands on the web server hosting the WordPress site. The CVSS v3.1 score is 8.8, indicating high severity, with an attack vector over the network, low attack complexity, and no user interaction required. The vulnerability affects all versions up to and including 1.9.0 of the plugin. While no public exploits have been reported yet, the ease of exploitation and the potential impact on site security make this a critical issue. The flaw compromises confidentiality, integrity, and availability by allowing attackers to gain control over the affected systems, potentially leading to data theft, site defacement, or further network compromise. The vulnerability is particularly dangerous because Contributor-level users are common in WordPress environments, and this level of access is often granted to trusted users, increasing the risk of insider threats or compromised accounts being leveraged for exploitation.
Potential Impact
For European organizations, this vulnerability poses a significant threat, especially for businesses and individuals operating WordPress sites with the WP Delicious plugin installed. The ability to upload arbitrary PHP files and achieve RCE can lead to full site compromise, data breaches involving sensitive user or customer data, defacement of websites, and potential pivoting to internal networks. Food bloggers, recipe websites, and related e-commerce platforms are particularly vulnerable due to their use of this plugin. The impact extends beyond individual sites to the broader ecosystem, as compromised sites can be used to distribute malware or conduct phishing campaigns targeting European users. Given the high adoption of WordPress across Europe, especially in countries with large digital content creator communities such as Germany, France, the UK, Italy, and Spain, the risk is substantial. Additionally, organizations subject to GDPR must consider the regulatory implications of data breaches resulting from exploitation of this vulnerability, including potential fines and reputational damage.
Mitigation Recommendations
1. Immediate mitigation involves restricting Contributor-level permissions to trusted users only and reviewing existing user roles to minimize exposure. 2. Disable or restrict the recipe import functionality, especially imports from remote URLs, until a patched version of the plugin is available. 3. Implement strict file upload validation and filtering at the web server or application firewall level to block uploads of executable file types such as PHP. 4. Monitor web server logs and WordPress upload directories for suspicious files or unusual activity indicative of exploitation attempts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to upload or execute malicious files via the plugin. 6. Regularly update WordPress core, plugins, and themes to the latest versions once a patch is released for this vulnerability. 7. Conduct security awareness training for users with Contributor or higher privileges to recognize phishing or social engineering attempts that could lead to account compromise. 8. Consider isolating WordPress instances or running them with least privilege to limit the impact of potential RCE.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-11755: CWE-434 Unrestricted Upload of File with Dangerous Type in wpdelicious WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes)
Description
The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file uploads when importing recipes via CSV in all versions up to, and including, 1.9.0. This flaw allows an attacker with at least Contributor-level permissions to upload a malicious PHP file by providing a remote URL during a recipe import process, leading to Remote Code Execution (RCE).
AI-Powered Analysis
Technical Analysis
CVE-2025-11755 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the WP Delicious – Recipe Plugin for Food Bloggers, a WordPress plugin used to manage and import recipes. The vulnerability exists in the recipe import functionality that accepts CSV files. An attacker with at least Contributor-level permissions can exploit this flaw by providing a remote URL pointing to a malicious PHP file during the import process. The plugin fails to properly validate or restrict the file types being uploaded, allowing arbitrary files, including executable PHP scripts, to be uploaded to the server. This leads to Remote Code Execution (RCE), enabling the attacker to execute arbitrary commands on the web server hosting the WordPress site. The CVSS v3.1 score is 8.8, indicating high severity, with an attack vector over the network, low attack complexity, and no user interaction required. The vulnerability affects all versions up to and including 1.9.0 of the plugin. While no public exploits have been reported yet, the ease of exploitation and the potential impact on site security make this a critical issue. The flaw compromises confidentiality, integrity, and availability by allowing attackers to gain control over the affected systems, potentially leading to data theft, site defacement, or further network compromise. The vulnerability is particularly dangerous because Contributor-level users are common in WordPress environments, and this level of access is often granted to trusted users, increasing the risk of insider threats or compromised accounts being leveraged for exploitation.
Potential Impact
For European organizations, this vulnerability poses a significant threat, especially for businesses and individuals operating WordPress sites with the WP Delicious plugin installed. The ability to upload arbitrary PHP files and achieve RCE can lead to full site compromise, data breaches involving sensitive user or customer data, defacement of websites, and potential pivoting to internal networks. Food bloggers, recipe websites, and related e-commerce platforms are particularly vulnerable due to their use of this plugin. The impact extends beyond individual sites to the broader ecosystem, as compromised sites can be used to distribute malware or conduct phishing campaigns targeting European users. Given the high adoption of WordPress across Europe, especially in countries with large digital content creator communities such as Germany, France, the UK, Italy, and Spain, the risk is substantial. Additionally, organizations subject to GDPR must consider the regulatory implications of data breaches resulting from exploitation of this vulnerability, including potential fines and reputational damage.
Mitigation Recommendations
1. Immediate mitigation involves restricting Contributor-level permissions to trusted users only and reviewing existing user roles to minimize exposure. 2. Disable or restrict the recipe import functionality, especially imports from remote URLs, until a patched version of the plugin is available. 3. Implement strict file upload validation and filtering at the web server or application firewall level to block uploads of executable file types such as PHP. 4. Monitor web server logs and WordPress upload directories for suspicious files or unusual activity indicative of exploitation attempts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to upload or execute malicious files via the plugin. 6. Regularly update WordPress core, plugins, and themes to the latest versions once a patch is released for this vulnerability. 7. Conduct security awareness training for users with Contributor or higher privileges to recognize phishing or social engineering attempts that could lead to account compromise. 8. Consider isolating WordPress instances or running them with least privilege to limit the impact of potential RCE.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-14T18:26:47.197Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6905ae02e1b1aafea8d7ec81
Added to database: 11/1/2025, 6:51:46 AM
Last enriched: 11/1/2025, 7:07:25 AM
Last updated: 11/1/2025, 1:24:14 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-36367: CWE-862 Missing Authorization
HighCVE-2025-6990: CWE-94 Improper Control of Generation of Code ('Code Injection') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
HighCVE-2025-6988: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
MediumCVE-2025-6574: CWE-639 Authorization Bypass Through User-Controlled Key in aonetheme Service Finder Bookings
HighCVE-2025-12171: CWE-434 Unrestricted Upload of File with Dangerous Type in anthonyeden RESTful Content Syndication
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.