Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12733: CWE-94 Improper Control of Generation of Code ('Code Injection') in wpallimport Import any XML, CSV or Excel File to WordPress

0
High
VulnerabilityCVE-2025-12733cvecve-2025-12733cwe-94
Published: Thu Nov 13 2025 (11/13/2025, 03:27:38 UTC)
Source: CVE Database V5
Vendor/Project: wpallimport
Product: Import any XML, CSV or Excel File to WordPress

Description

The Import any XML, CSV or Excel File to WordPress (WP All Import) plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 3.9.6. This is due to the use of eval() on unsanitized user-supplied input in the pmxi_if function within helpers/functions.php. This makes it possible for authenticated attackers, with import capabilities (typically administrators), to inject and execute arbitrary PHP code on the server via crafted import templates. This can lead to remote code execution.

AI-Powered Analysis

AILast updated: 11/13/2025, 03:58:22 UTC

Technical Analysis

CVE-2025-12733 is a critical vulnerability in the WP All Import plugin for WordPress, specifically in versions up to and including 3.9.6. The root cause is the improper use of the PHP eval() function on unsanitized user input within the pmxi_if function located in helpers/functions.php. This function processes import templates that can contain XML, CSV, or Excel data. Authenticated users with import permissions, typically administrators, can craft malicious import templates that inject arbitrary PHP code. When the plugin processes these templates, the injected code is executed on the server, leading to remote code execution (RCE). The vulnerability is classified under CWE-94 (Improper Control of Generation of Code), indicating a code injection flaw. The CVSS v3.1 score is 8.8 (high), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the vulnerability poses a significant risk due to the potential for complete server compromise. The plugin is widely used for importing data into WordPress sites, which are prevalent globally, including Europe. The lack of a patch at the time of publication means organizations must rely on temporary mitigations. The vulnerability's exploitation could allow attackers to deploy backdoors, steal sensitive data, deface websites, or pivot to internal networks.

Potential Impact

For European organizations, the impact of CVE-2025-12733 can be severe. WordPress powers a substantial portion of websites across Europe, including government portals, e-commerce platforms, media outlets, and corporate sites. Organizations using the WP All Import plugin for data importation are at risk of unauthorized remote code execution if an attacker gains import privileges. This could lead to data breaches involving personal data protected under GDPR, service disruptions, defacement, or use of compromised servers for further attacks such as ransomware or lateral movement within networks. The high severity and ease of exploitation by authenticated users mean that insider threats or compromised credentials could quickly escalate to full system compromise. The absence of a patch increases the window of exposure, making timely mitigation critical. The reputational damage and regulatory penalties for data breaches in Europe could be substantial.

Mitigation Recommendations

1. Immediately restrict import capabilities to only highly trusted administrators and monitor import activity logs for suspicious templates. 2. Disable or uninstall the WP All Import plugin if it is not essential or if import functionality can be temporarily suspended. 3. Implement strict access controls and multi-factor authentication (MFA) for all WordPress administrator accounts to reduce the risk of credential compromise. 4. Monitor WordPress logs and server activity for unusual PHP execution or file changes indicative of exploitation attempts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious import payloads or eval() usage patterns. 6. Once a patch is released by the vendor, prioritize immediate update of the plugin to the fixed version. 7. Conduct regular security audits and vulnerability scans on WordPress installations to detect outdated plugins and known vulnerabilities. 8. Educate administrators on the risks of importing untrusted data and enforce strict validation of import templates before execution.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-04T22:13:08.724Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691553e024a15f0eafbbc0a5

Added to database: 11/13/2025, 3:43:28 AM

Last enriched: 11/13/2025, 3:58:22 AM

Last updated: 11/13/2025, 8:14:48 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats