CVE-2025-12137: CWE-73 External Control of File Name or Path in jcollings Import WP – Export and Import CSV and XML files to WordPress
The Import WP – Export and Import CSV and XML files to WordPress plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.14.16. This is due to the plugin's REST API endpoint accepting arbitrary absolute file paths without proper validation in the 'attach_file()' function when handling 'file_local' actions. This makes it possible for authenticated attackers, with administrator-level access and above, to read arbitrary files on the server's filesystem, including sensitive configuration files and system files via the 'local_url' parameter.
AI Analysis
Technical Summary
CVE-2025-12137 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting the WordPress plugin 'Import WP – Export and Import CSV and XML files to WordPress' by jcollings. The flaw exists in the plugin's REST API endpoint that handles 'file_local' actions via the 'attach_file()' function. This endpoint accepts arbitrary absolute file paths through the 'local_url' parameter without proper validation or sanitization. As a result, authenticated users with administrator-level privileges or higher can exploit this to perform arbitrary file reads on the server hosting the WordPress instance. This can expose sensitive files such as configuration files (e.g., wp-config.php), system files, or other data stored on the server. The vulnerability affects all plugin versions up to and including 2.14.16. The CVSS v3.1 base score is 4.9, reflecting medium severity, with attack vector network, low attack complexity, high privileges required, no user interaction, and high confidentiality impact but no integrity or availability impact. No public exploits have been reported yet, and no patches have been linked at the time of publication. The vulnerability was reserved on 2025-10-23 and published on 2025-11-01. The flaw highlights the risk of insufficient input validation in REST API endpoints that handle file paths, especially when exposed to privileged users.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive server-side files, which can include WordPress configuration files containing database credentials, API keys, or other secrets. This information disclosure can facilitate further attacks such as privilege escalation, lateral movement, or data exfiltration. Since exploitation requires administrator-level access, the threat is somewhat limited to insiders or attackers who have already compromised an admin account. However, given the widespread use of WordPress and this plugin, the vulnerability can be leveraged in multi-tenant hosting environments or by attackers who gain admin credentials through phishing or other means. The vulnerability does not affect integrity or availability directly but can significantly compromise confidentiality, undermining trust and potentially leading to broader system compromise. Organizations relying on this plugin without mitigation risk exposure of critical internal files, which can have regulatory and reputational consequences.
Mitigation Recommendations
Immediate mitigation steps include restricting administrator access to trusted personnel only and auditing existing admin accounts for suspicious activity. Network-level controls such as web application firewalls (WAFs) can be configured to block or monitor requests to the vulnerable REST API endpoint, especially those containing suspicious 'local_url' parameters. Administrators should disable or remove the vulnerable plugin if it is not essential. Since no official patch is currently available, organizations should monitor the vendor’s announcements and apply updates promptly once released. Additionally, implementing file system permissions to limit the WordPress process's ability to read sensitive files can reduce exposure. Regularly scanning WordPress installations for outdated or vulnerable plugins and enforcing the principle of least privilege for admin accounts are also recommended. Logging and alerting on unusual file access patterns can help detect exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2025-12137: CWE-73 External Control of File Name or Path in jcollings Import WP – Export and Import CSV and XML files to WordPress
Description
The Import WP – Export and Import CSV and XML files to WordPress plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.14.16. This is due to the plugin's REST API endpoint accepting arbitrary absolute file paths without proper validation in the 'attach_file()' function when handling 'file_local' actions. This makes it possible for authenticated attackers, with administrator-level access and above, to read arbitrary files on the server's filesystem, including sensitive configuration files and system files via the 'local_url' parameter.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12137 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting the WordPress plugin 'Import WP – Export and Import CSV and XML files to WordPress' by jcollings. The flaw exists in the plugin's REST API endpoint that handles 'file_local' actions via the 'attach_file()' function. This endpoint accepts arbitrary absolute file paths through the 'local_url' parameter without proper validation or sanitization. As a result, authenticated users with administrator-level privileges or higher can exploit this to perform arbitrary file reads on the server hosting the WordPress instance. This can expose sensitive files such as configuration files (e.g., wp-config.php), system files, or other data stored on the server. The vulnerability affects all plugin versions up to and including 2.14.16. The CVSS v3.1 base score is 4.9, reflecting medium severity, with attack vector network, low attack complexity, high privileges required, no user interaction, and high confidentiality impact but no integrity or availability impact. No public exploits have been reported yet, and no patches have been linked at the time of publication. The vulnerability was reserved on 2025-10-23 and published on 2025-11-01. The flaw highlights the risk of insufficient input validation in REST API endpoints that handle file paths, especially when exposed to privileged users.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive server-side files, which can include WordPress configuration files containing database credentials, API keys, or other secrets. This information disclosure can facilitate further attacks such as privilege escalation, lateral movement, or data exfiltration. Since exploitation requires administrator-level access, the threat is somewhat limited to insiders or attackers who have already compromised an admin account. However, given the widespread use of WordPress and this plugin, the vulnerability can be leveraged in multi-tenant hosting environments or by attackers who gain admin credentials through phishing or other means. The vulnerability does not affect integrity or availability directly but can significantly compromise confidentiality, undermining trust and potentially leading to broader system compromise. Organizations relying on this plugin without mitigation risk exposure of critical internal files, which can have regulatory and reputational consequences.
Mitigation Recommendations
Immediate mitigation steps include restricting administrator access to trusted personnel only and auditing existing admin accounts for suspicious activity. Network-level controls such as web application firewalls (WAFs) can be configured to block or monitor requests to the vulnerable REST API endpoint, especially those containing suspicious 'local_url' parameters. Administrators should disable or remove the vulnerable plugin if it is not essential. Since no official patch is currently available, organizations should monitor the vendor’s announcements and apply updates promptly once released. Additionally, implementing file system permissions to limit the WordPress process's ability to read sensitive files can reduce exposure. Regularly scanning WordPress installations for outdated or vulnerable plugins and enforcing the principle of least privilege for admin accounts are also recommended. Logging and alerting on unusual file access patterns can help detect exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-23T21:15:40.493Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6905ae02e1b1aafea8d7ec85
Added to database: 11/1/2025, 6:51:46 AM
Last enriched: 2/27/2026, 8:10:56 PM
Last updated: 3/23/2026, 4:08:33 AM
Views: 115
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.