CVE-2025-12733: CWE-94 Improper Control of Generation of Code ('Code Injection') in wpallimport Import any XML, CSV or Excel File to WordPress
The Import any XML, CSV or Excel File to WordPress (WP All Import) plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 3.9.6. This is due to the use of eval() on unsanitized user-supplied input in the pmxi_if function within helpers/functions.php. This makes it possible for authenticated attackers, with import capabilities (typically administrators), to inject and execute arbitrary PHP code on the server via crafted import templates. This can lead to remote code execution.
AI Analysis
Technical Summary
CVE-2025-12733 is a critical vulnerability in the WP All Import plugin for WordPress, specifically in versions up to and including 3.9.6. The root cause is the improper use of the PHP eval() function on unsanitized user input within the pmxi_if function located in helpers/functions.php. This function processes import templates that can contain XML, CSV, or Excel data. Authenticated users with import permissions, typically administrators, can craft malicious import templates that inject arbitrary PHP code. When the plugin processes these templates, the injected code is executed on the server, leading to remote code execution (RCE). The vulnerability is classified under CWE-94 (Improper Control of Generation of Code), indicating a code injection flaw. The CVSS v3.1 score is 8.8 (high), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the vulnerability poses a significant risk due to the potential for complete server compromise. The plugin is widely used for importing data into WordPress sites, which are prevalent globally, including Europe. The lack of a patch at the time of publication means organizations must rely on temporary mitigations. The vulnerability's exploitation could allow attackers to deploy backdoors, steal sensitive data, deface websites, or pivot to internal networks.
Potential Impact
For European organizations, the impact of CVE-2025-12733 can be severe. WordPress powers a substantial portion of websites across Europe, including government portals, e-commerce platforms, media outlets, and corporate sites. Organizations using the WP All Import plugin for data importation are at risk of unauthorized remote code execution if an attacker gains import privileges. This could lead to data breaches involving personal data protected under GDPR, service disruptions, defacement, or use of compromised servers for further attacks such as ransomware or lateral movement within networks. The high severity and ease of exploitation by authenticated users mean that insider threats or compromised credentials could quickly escalate to full system compromise. The absence of a patch increases the window of exposure, making timely mitigation critical. The reputational damage and regulatory penalties for data breaches in Europe could be substantial.
Mitigation Recommendations
1. Immediately restrict import capabilities to only highly trusted administrators and monitor import activity logs for suspicious templates. 2. Disable or uninstall the WP All Import plugin if it is not essential or if import functionality can be temporarily suspended. 3. Implement strict access controls and multi-factor authentication (MFA) for all WordPress administrator accounts to reduce the risk of credential compromise. 4. Monitor WordPress logs and server activity for unusual PHP execution or file changes indicative of exploitation attempts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious import payloads or eval() usage patterns. 6. Once a patch is released by the vendor, prioritize immediate update of the plugin to the fixed version. 7. Conduct regular security audits and vulnerability scans on WordPress installations to detect outdated plugins and known vulnerabilities. 8. Educate administrators on the risks of importing untrusted data and enforce strict validation of import templates before execution.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12733: CWE-94 Improper Control of Generation of Code ('Code Injection') in wpallimport Import any XML, CSV or Excel File to WordPress
Description
The Import any XML, CSV or Excel File to WordPress (WP All Import) plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 3.9.6. This is due to the use of eval() on unsanitized user-supplied input in the pmxi_if function within helpers/functions.php. This makes it possible for authenticated attackers, with import capabilities (typically administrators), to inject and execute arbitrary PHP code on the server via crafted import templates. This can lead to remote code execution.
AI-Powered Analysis
Technical Analysis
CVE-2025-12733 is a critical vulnerability in the WP All Import plugin for WordPress, specifically in versions up to and including 3.9.6. The root cause is the improper use of the PHP eval() function on unsanitized user input within the pmxi_if function located in helpers/functions.php. This function processes import templates that can contain XML, CSV, or Excel data. Authenticated users with import permissions, typically administrators, can craft malicious import templates that inject arbitrary PHP code. When the plugin processes these templates, the injected code is executed on the server, leading to remote code execution (RCE). The vulnerability is classified under CWE-94 (Improper Control of Generation of Code), indicating a code injection flaw. The CVSS v3.1 score is 8.8 (high), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the vulnerability poses a significant risk due to the potential for complete server compromise. The plugin is widely used for importing data into WordPress sites, which are prevalent globally, including Europe. The lack of a patch at the time of publication means organizations must rely on temporary mitigations. The vulnerability's exploitation could allow attackers to deploy backdoors, steal sensitive data, deface websites, or pivot to internal networks.
Potential Impact
For European organizations, the impact of CVE-2025-12733 can be severe. WordPress powers a substantial portion of websites across Europe, including government portals, e-commerce platforms, media outlets, and corporate sites. Organizations using the WP All Import plugin for data importation are at risk of unauthorized remote code execution if an attacker gains import privileges. This could lead to data breaches involving personal data protected under GDPR, service disruptions, defacement, or use of compromised servers for further attacks such as ransomware or lateral movement within networks. The high severity and ease of exploitation by authenticated users mean that insider threats or compromised credentials could quickly escalate to full system compromise. The absence of a patch increases the window of exposure, making timely mitigation critical. The reputational damage and regulatory penalties for data breaches in Europe could be substantial.
Mitigation Recommendations
1. Immediately restrict import capabilities to only highly trusted administrators and monitor import activity logs for suspicious templates. 2. Disable or uninstall the WP All Import plugin if it is not essential or if import functionality can be temporarily suspended. 3. Implement strict access controls and multi-factor authentication (MFA) for all WordPress administrator accounts to reduce the risk of credential compromise. 4. Monitor WordPress logs and server activity for unusual PHP execution or file changes indicative of exploitation attempts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious import payloads or eval() usage patterns. 6. Once a patch is released by the vendor, prioritize immediate update of the plugin to the fixed version. 7. Conduct regular security audits and vulnerability scans on WordPress installations to detect outdated plugins and known vulnerabilities. 8. Educate administrators on the risks of importing untrusted data and enforce strict validation of import templates before execution.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-04T22:13:08.724Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691553e024a15f0eafbbc0a5
Added to database: 11/13/2025, 3:43:28 AM
Last enriched: 11/13/2025, 3:58:22 AM
Last updated: 11/13/2025, 8:14:48 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12844: CWE-502 Deserialization of Untrusted Data in tigroumeow AI Engine
HighCVE-2025-12681: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ronalfy Comment Edit Core – Simple Comment Editing
MediumCVE-2025-12620: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ays-pro Poll Maker – Versus Polls, Anonymous Polls, Image Polls
MediumCVE-2024-7341: Session Fixation
HighFirefox 145 and Chrome 142 Patch High-Severity Flaws in Latest Releases
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.