CVE-2025-11755: CWE-434 Unrestricted Upload of File with Dangerous Type in wpdelicious WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes)
The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file uploads when importing recipes via CSV in all versions up to, and including, 1.9.0. This flaw allows an attacker with at least Contributor-level permissions to upload a malicious PHP file by providing a remote URL during a recipe import process, leading to Remote Code Execution (RCE).
AI Analysis
Technical Summary
The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) WordPress plugin suffers from a critical vulnerability identified as CVE-2025-11755, categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type). This vulnerability exists in the recipe import functionality, which allows users with at least Contributor-level permissions to import recipes via CSV files. The flaw permits an attacker to specify a remote URL during the import process, which the plugin then uses to upload files without proper validation or restriction on file types. Consequently, an attacker can upload arbitrary files, including malicious PHP scripts, leading to Remote Code Execution (RCE) on the hosting server. The vulnerability affects all plugin versions up to and including 1.9.0. The CVSS v3.1 base score is 8.8, indicating high severity, with attack vector as network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, as successful exploitation allows full control over the affected WordPress site and potentially the underlying server. No patches or updates are currently linked, and no known exploits have been reported in the wild as of the publication date (November 1, 2025). The vulnerability is particularly dangerous because Contributor-level users are common in WordPress environments, and the import feature is often used to bulk upload content, making it an attractive attack vector.
Potential Impact
For European organizations, this vulnerability poses a significant risk to WordPress-based websites that utilize the WP Delicious plugin for recipe management. Successful exploitation can lead to full Remote Code Execution, allowing attackers to execute arbitrary commands, install backdoors, steal sensitive data, deface websites, or pivot to internal networks. This can result in data breaches, service disruptions, reputational damage, and compliance violations under regulations such as GDPR. Food bloggers, culinary businesses, and media companies using this plugin are particularly vulnerable. Given the ease of exploitation by users with Contributor privileges, insider threats or compromised contributor accounts could be leveraged to launch attacks. The lack of required user interaction increases the likelihood of automated exploitation attempts once the vulnerability becomes widely known. The impact extends beyond individual sites, as compromised servers can be used to distribute malware or conduct further attacks within European networks.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability. First, restrict Contributor-level users from importing recipes until a secure patch or update is available. If possible, disable the CSV import feature in the plugin settings or remove the plugin entirely if not essential. Implement strict validation and sanitization of imported data, ensuring only safe file types are accepted and remote URLs are blocked or verified. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious file upload attempts targeting this plugin. Monitor logs for unusual import activity or file uploads. Limit Contributor permissions to trusted users only and enforce strong authentication mechanisms, including multi-factor authentication (MFA). Regularly back up WordPress sites and test restoration procedures. Stay updated with vendor advisories and apply patches promptly once released. Conduct security audits of WordPress environments to identify and remediate similar risks.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-11755: CWE-434 Unrestricted Upload of File with Dangerous Type in wpdelicious WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes)
Description
The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file uploads when importing recipes via CSV in all versions up to, and including, 1.9.0. This flaw allows an attacker with at least Contributor-level permissions to upload a malicious PHP file by providing a remote URL during a recipe import process, leading to Remote Code Execution (RCE).
AI-Powered Analysis
Technical Analysis
The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) WordPress plugin suffers from a critical vulnerability identified as CVE-2025-11755, categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type). This vulnerability exists in the recipe import functionality, which allows users with at least Contributor-level permissions to import recipes via CSV files. The flaw permits an attacker to specify a remote URL during the import process, which the plugin then uses to upload files without proper validation or restriction on file types. Consequently, an attacker can upload arbitrary files, including malicious PHP scripts, leading to Remote Code Execution (RCE) on the hosting server. The vulnerability affects all plugin versions up to and including 1.9.0. The CVSS v3.1 base score is 8.8, indicating high severity, with attack vector as network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, as successful exploitation allows full control over the affected WordPress site and potentially the underlying server. No patches or updates are currently linked, and no known exploits have been reported in the wild as of the publication date (November 1, 2025). The vulnerability is particularly dangerous because Contributor-level users are common in WordPress environments, and the import feature is often used to bulk upload content, making it an attractive attack vector.
Potential Impact
For European organizations, this vulnerability poses a significant risk to WordPress-based websites that utilize the WP Delicious plugin for recipe management. Successful exploitation can lead to full Remote Code Execution, allowing attackers to execute arbitrary commands, install backdoors, steal sensitive data, deface websites, or pivot to internal networks. This can result in data breaches, service disruptions, reputational damage, and compliance violations under regulations such as GDPR. Food bloggers, culinary businesses, and media companies using this plugin are particularly vulnerable. Given the ease of exploitation by users with Contributor privileges, insider threats or compromised contributor accounts could be leveraged to launch attacks. The lack of required user interaction increases the likelihood of automated exploitation attempts once the vulnerability becomes widely known. The impact extends beyond individual sites, as compromised servers can be used to distribute malware or conduct further attacks within European networks.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability. First, restrict Contributor-level users from importing recipes until a secure patch or update is available. If possible, disable the CSV import feature in the plugin settings or remove the plugin entirely if not essential. Implement strict validation and sanitization of imported data, ensuring only safe file types are accepted and remote URLs are blocked or verified. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious file upload attempts targeting this plugin. Monitor logs for unusual import activity or file uploads. Limit Contributor permissions to trusted users only and enforce strong authentication mechanisms, including multi-factor authentication (MFA). Regularly back up WordPress sites and test restoration procedures. Stay updated with vendor advisories and apply patches promptly once released. Conduct security audits of WordPress environments to identify and remediate similar risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-14T18:26:47.197Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6905ae02e1b1aafea8d7ec81
Added to database: 11/1/2025, 6:51:46 AM
Last enriched: 11/10/2025, 2:33:13 AM
Last updated: 12/14/2025, 1:49:33 PM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14662: Cross Site Scripting in code-projects Student File Management System
MediumCVE-2025-14660: Improper Access Controls in DecoCMS Mesh
MediumCVE-2025-14661: SQL Injection in itsourcecode Student Managemen System
MediumCVE-2025-14659: Command Injection in D-Link DIR-860LB1
HighCVE-2025-14656: Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.