Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11755: CWE-434 Unrestricted Upload of File with Dangerous Type in wpdelicious WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes)

0
High
VulnerabilityCVE-2025-11755cvecve-2025-11755cwe-434
Published: Sat Nov 01 2025 (11/01/2025, 06:40:39 UTC)
Source: CVE Database V5
Vendor/Project: wpdelicious
Product: WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes)

Description

The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file uploads when importing recipes via CSV in all versions up to, and including, 1.9.0. This flaw allows an attacker with at least Contributor-level permissions to upload a malicious PHP file by providing a remote URL during a recipe import process, leading to Remote Code Execution (RCE).

AI-Powered Analysis

AILast updated: 11/01/2025, 07:07:25 UTC

Technical Analysis

CVE-2025-11755 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the WP Delicious – Recipe Plugin for Food Bloggers, a WordPress plugin used to manage and import recipes. The vulnerability exists in the recipe import functionality that accepts CSV files. An attacker with at least Contributor-level permissions can exploit this flaw by providing a remote URL pointing to a malicious PHP file during the import process. The plugin fails to properly validate or restrict the file types being uploaded, allowing arbitrary files, including executable PHP scripts, to be uploaded to the server. This leads to Remote Code Execution (RCE), enabling the attacker to execute arbitrary commands on the web server hosting the WordPress site. The CVSS v3.1 score is 8.8, indicating high severity, with an attack vector over the network, low attack complexity, and no user interaction required. The vulnerability affects all versions up to and including 1.9.0 of the plugin. While no public exploits have been reported yet, the ease of exploitation and the potential impact on site security make this a critical issue. The flaw compromises confidentiality, integrity, and availability by allowing attackers to gain control over the affected systems, potentially leading to data theft, site defacement, or further network compromise. The vulnerability is particularly dangerous because Contributor-level users are common in WordPress environments, and this level of access is often granted to trusted users, increasing the risk of insider threats or compromised accounts being leveraged for exploitation.

Potential Impact

For European organizations, this vulnerability poses a significant threat, especially for businesses and individuals operating WordPress sites with the WP Delicious plugin installed. The ability to upload arbitrary PHP files and achieve RCE can lead to full site compromise, data breaches involving sensitive user or customer data, defacement of websites, and potential pivoting to internal networks. Food bloggers, recipe websites, and related e-commerce platforms are particularly vulnerable due to their use of this plugin. The impact extends beyond individual sites to the broader ecosystem, as compromised sites can be used to distribute malware or conduct phishing campaigns targeting European users. Given the high adoption of WordPress across Europe, especially in countries with large digital content creator communities such as Germany, France, the UK, Italy, and Spain, the risk is substantial. Additionally, organizations subject to GDPR must consider the regulatory implications of data breaches resulting from exploitation of this vulnerability, including potential fines and reputational damage.

Mitigation Recommendations

1. Immediate mitigation involves restricting Contributor-level permissions to trusted users only and reviewing existing user roles to minimize exposure. 2. Disable or restrict the recipe import functionality, especially imports from remote URLs, until a patched version of the plugin is available. 3. Implement strict file upload validation and filtering at the web server or application firewall level to block uploads of executable file types such as PHP. 4. Monitor web server logs and WordPress upload directories for suspicious files or unusual activity indicative of exploitation attempts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to upload or execute malicious files via the plugin. 6. Regularly update WordPress core, plugins, and themes to the latest versions once a patch is released for this vulnerability. 7. Conduct security awareness training for users with Contributor or higher privileges to recognize phishing or social engineering attempts that could lead to account compromise. 8. Consider isolating WordPress instances or running them with least privilege to limit the impact of potential RCE.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-14T18:26:47.197Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6905ae02e1b1aafea8d7ec81

Added to database: 11/1/2025, 6:51:46 AM

Last enriched: 11/1/2025, 7:07:25 AM

Last updated: 11/1/2025, 1:24:14 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats