Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13066: CWE-434 Unrestricted Upload of File with Dangerous Type in kraftplugins Demo Importer Plus

0
High
VulnerabilityCVE-2025-13066cvecve-2025-13066cwe-434
Published: Fri Dec 05 2025 (12/05/2025, 03:28:36 UTC)
Source: CVE Database V5
Vendor/Project: kraftplugins
Product: Demo Importer Plus

Description

The Demo Importer Plus plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 2.0.6. This is due to insufficient file type validation detecting WXR files, allowing double extension files to bypass sanitization while being accepted as a valid WXR file. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:28:08 UTC

Technical Analysis

CVE-2025-13066 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Demo Importer Plus plugin for WordPress, specifically versions up to and including 2.0.6. The root cause is insufficient validation of uploaded files intended to be WXR (WordPress eXtended RSS) files. The plugin's sanitization process fails to detect files with double extensions that appear as valid WXR files but actually contain malicious payloads. Authenticated users with author-level access or higher can exploit this flaw to upload arbitrary files to the server hosting the WordPress site. This arbitrary file upload can lead to remote code execution (RCE), allowing attackers to execute malicious code with the privileges of the web server process. The vulnerability is remotely exploitable over the network without user interaction once the attacker has the required privileges. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and privileges required. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved and published in late 2025, indicating recent discovery and disclosure.

Potential Impact

The impact of CVE-2025-13066 is significant for organizations running WordPress sites with the Demo Importer Plus plugin installed. Successful exploitation can lead to remote code execution, enabling attackers to take full control of the affected web server. This can result in data breaches, defacement, deployment of malware or ransomware, and use of the compromised server as a pivot point for further attacks within the network. The requirement for author-level access means that attackers must first compromise or have legitimate credentials for an account with elevated privileges, which is common in multi-user WordPress environments. Given WordPress's dominant market share in content management systems globally, this vulnerability poses a widespread risk, especially to websites that do not regularly update plugins or enforce strict access controls. The lack of known exploits currently provides a window for mitigation, but the high CVSS score underscores the urgency of addressing the issue to prevent future attacks.

Mitigation Recommendations

Organizations should immediately verify if they use the Demo Importer Plus plugin and identify the version installed. Since no official patch links are currently available, administrators should consider the following mitigations: 1) Temporarily disable or uninstall the Demo Importer Plus plugin until a patch is released. 2) Restrict author-level and higher privileges to trusted users only and review user accounts for suspicious activity. 3) Implement web application firewall (WAF) rules to detect and block suspicious file upload attempts, particularly those involving double extensions or unusual file types. 4) Monitor server logs for anomalous upload activity or execution of unexpected files. 5) Harden the web server environment by disabling execution permissions in upload directories and applying the principle of least privilege to file system permissions. 6) Stay informed about official patches or updates from the vendor and apply them promptly once available. 7) Conduct regular security audits and penetration testing focusing on file upload functionalities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-12T13:23:44.451Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693255a910edf2688fec311d

Added to database: 12/5/2025, 3:46:49 AM

Last enriched: 2/27/2026, 9:28:08 AM

Last updated: 3/23/2026, 4:21:21 PM

Views: 147

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses