CVE-2025-12732: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in smackcoders WP Import – Ultimate CSV XML Importer for WordPress
The WP Import – Ultimate CSV XML Importer for WordPress plugin for WordPress is vulnerable to unauthorized access of sensitive information due to a missing authorization check on the showsetting() function in all versions up to, and including, 7.33. This makes it possible for authenticated attackers, with Author-level access or higher, to extract sensitive information including OpenAI API keys configured through the plugin's admin interface.
AI Analysis
Technical Summary
The WP Import – Ultimate CSV XML Importer for WordPress plugin suffers from a CWE-200 vulnerability identified as CVE-2025-12732. The root cause is a missing authorization check in the showsetting() function, which is accessible to authenticated users with Author-level privileges or higher. This function exposes sensitive configuration data, including OpenAI API keys, which attackers can extract without additional user interaction. The vulnerability affects all plugin versions up to 7.33. The CVSS v3.1 score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and impacts confidentiality only. The vulnerability does not affect integrity or availability. No patches have been linked yet, and no known exploits are reported in the wild. The exposure of API keys can lead to unauthorized use of OpenAI services, potentially incurring costs or data leakage. Since the flaw requires authenticated access at Author level, the risk is mitigated somewhat by proper user role management but remains significant in environments with multiple contributors or compromised accounts.
Potential Impact
For European organizations, the primary impact is unauthorized disclosure of sensitive information, specifically OpenAI API keys configured in the plugin. This could lead to misuse of AI services, resulting in financial costs or data privacy concerns. Although the vulnerability does not directly compromise website integrity or availability, the exposure of API keys can indirectly affect business operations if attackers leverage these keys for malicious purposes. Organizations with multiple content authors or contributors are at higher risk due to the Author-level access requirement. The vulnerability could also facilitate further attacks if attackers use the exposed keys to gather additional intelligence or escalate privileges. Given the widespread use of WordPress in Europe, especially in Germany, the UK, and France, organizations in these countries are more likely to be affected. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.
Mitigation Recommendations
Organizations should immediately audit user roles and restrict Author-level access to trusted personnel only. Implement the principle of least privilege to minimize the number of users who can exploit this vulnerability. Monitor and rotate any exposed OpenAI API keys to prevent unauthorized use. Since no official patch is currently available, consider temporarily disabling or replacing the plugin with alternatives that do not have this vulnerability. Employ web application firewalls (WAFs) to detect and block suspicious requests targeting the showsetting() function. Regularly review plugin updates from the vendor and apply patches as soon as they are released. Additionally, conduct security awareness training for users with elevated privileges to recognize and report suspicious activity. Finally, implement logging and alerting on access to sensitive plugin functions to detect potential exploitation attempts early.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-12732: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in smackcoders WP Import – Ultimate CSV XML Importer for WordPress
Description
The WP Import – Ultimate CSV XML Importer for WordPress plugin for WordPress is vulnerable to unauthorized access of sensitive information due to a missing authorization check on the showsetting() function in all versions up to, and including, 7.33. This makes it possible for authenticated attackers, with Author-level access or higher, to extract sensitive information including OpenAI API keys configured through the plugin's admin interface.
AI-Powered Analysis
Technical Analysis
The WP Import – Ultimate CSV XML Importer for WordPress plugin suffers from a CWE-200 vulnerability identified as CVE-2025-12732. The root cause is a missing authorization check in the showsetting() function, which is accessible to authenticated users with Author-level privileges or higher. This function exposes sensitive configuration data, including OpenAI API keys, which attackers can extract without additional user interaction. The vulnerability affects all plugin versions up to 7.33. The CVSS v3.1 score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and impacts confidentiality only. The vulnerability does not affect integrity or availability. No patches have been linked yet, and no known exploits are reported in the wild. The exposure of API keys can lead to unauthorized use of OpenAI services, potentially incurring costs or data leakage. Since the flaw requires authenticated access at Author level, the risk is mitigated somewhat by proper user role management but remains significant in environments with multiple contributors or compromised accounts.
Potential Impact
For European organizations, the primary impact is unauthorized disclosure of sensitive information, specifically OpenAI API keys configured in the plugin. This could lead to misuse of AI services, resulting in financial costs or data privacy concerns. Although the vulnerability does not directly compromise website integrity or availability, the exposure of API keys can indirectly affect business operations if attackers leverage these keys for malicious purposes. Organizations with multiple content authors or contributors are at higher risk due to the Author-level access requirement. The vulnerability could also facilitate further attacks if attackers use the exposed keys to gather additional intelligence or escalate privileges. Given the widespread use of WordPress in Europe, especially in Germany, the UK, and France, organizations in these countries are more likely to be affected. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.
Mitigation Recommendations
Organizations should immediately audit user roles and restrict Author-level access to trusted personnel only. Implement the principle of least privilege to minimize the number of users who can exploit this vulnerability. Monitor and rotate any exposed OpenAI API keys to prevent unauthorized use. Since no official patch is currently available, consider temporarily disabling or replacing the plugin with alternatives that do not have this vulnerability. Employ web application firewalls (WAFs) to detect and block suspicious requests targeting the showsetting() function. Regularly review plugin updates from the vendor and apply patches as soon as they are released. Additionally, conduct security awareness training for users with elevated privileges to recognize and report suspicious activity. Finally, implement logging and alerting on access to sensitive plugin functions to detect potential exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-04T22:08:04.891Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6914483ad823118ac8c87d30
Added to database: 11/12/2025, 8:41:30 AM
Last enriched: 11/12/2025, 8:56:43 AM
Last updated: 11/12/2025, 9:59:09 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Google Launches 'Private AI Compute' — Secure AI Processing with On-Device-Level Privacy
MediumCVE-2025-12382: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in AlgoSec Firewall Analyzer
HighCVE-2025-64407: CWE-862 Missing Authorization in Apache Software Foundation Apache OpenOffice
HighCVE-2025-61623: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Apache Software Foundation Apache OFBiz
HighCVE-2025-59118: CWE-434 Unrestricted Upload of File with Dangerous Type in Apache Software Foundation Apache OFBiz
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.