Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12732: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in smackcoders WP Import – Ultimate CSV XML Importer for WordPress

0
Medium
VulnerabilityCVE-2025-12732cvecve-2025-12732cwe-200
Published: Wed Nov 12 2025 (11/12/2025, 08:28:04 UTC)
Source: CVE Database V5
Vendor/Project: smackcoders
Product: WP Import – Ultimate CSV XML Importer for WordPress

Description

The WP Import – Ultimate CSV XML Importer for WordPress plugin for WordPress is vulnerable to unauthorized access of sensitive information due to a missing authorization check on the showsetting() function in all versions up to, and including, 7.33. This makes it possible for authenticated attackers, with Author-level access or higher, to extract sensitive information including OpenAI API keys configured through the plugin's admin interface.

AI-Powered Analysis

AILast updated: 11/12/2025, 08:56:43 UTC

Technical Analysis

The WP Import – Ultimate CSV XML Importer for WordPress plugin suffers from a CWE-200 vulnerability identified as CVE-2025-12732. The root cause is a missing authorization check in the showsetting() function, which is accessible to authenticated users with Author-level privileges or higher. This function exposes sensitive configuration data, including OpenAI API keys, which attackers can extract without additional user interaction. The vulnerability affects all plugin versions up to 7.33. The CVSS v3.1 score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and impacts confidentiality only. The vulnerability does not affect integrity or availability. No patches have been linked yet, and no known exploits are reported in the wild. The exposure of API keys can lead to unauthorized use of OpenAI services, potentially incurring costs or data leakage. Since the flaw requires authenticated access at Author level, the risk is mitigated somewhat by proper user role management but remains significant in environments with multiple contributors or compromised accounts.

Potential Impact

For European organizations, the primary impact is unauthorized disclosure of sensitive information, specifically OpenAI API keys configured in the plugin. This could lead to misuse of AI services, resulting in financial costs or data privacy concerns. Although the vulnerability does not directly compromise website integrity or availability, the exposure of API keys can indirectly affect business operations if attackers leverage these keys for malicious purposes. Organizations with multiple content authors or contributors are at higher risk due to the Author-level access requirement. The vulnerability could also facilitate further attacks if attackers use the exposed keys to gather additional intelligence or escalate privileges. Given the widespread use of WordPress in Europe, especially in Germany, the UK, and France, organizations in these countries are more likely to be affected. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.

Mitigation Recommendations

Organizations should immediately audit user roles and restrict Author-level access to trusted personnel only. Implement the principle of least privilege to minimize the number of users who can exploit this vulnerability. Monitor and rotate any exposed OpenAI API keys to prevent unauthorized use. Since no official patch is currently available, consider temporarily disabling or replacing the plugin with alternatives that do not have this vulnerability. Employ web application firewalls (WAFs) to detect and block suspicious requests targeting the showsetting() function. Regularly review plugin updates from the vendor and apply patches as soon as they are released. Additionally, conduct security awareness training for users with elevated privileges to recognize and report suspicious activity. Finally, implement logging and alerting on access to sensitive plugin functions to detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-04T22:08:04.891Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914483ad823118ac8c87d30

Added to database: 11/12/2025, 8:41:30 AM

Last enriched: 11/12/2025, 8:56:43 AM

Last updated: 11/12/2025, 9:59:09 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats