CVE-2025-13066: CWE-434 Unrestricted Upload of File with Dangerous Type in kraftplugins Demo Importer Plus
The Demo Importer Plus plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 2.0.6. This is due to insufficient file type validation detecting WXR files, allowing double extension files to bypass sanitization while being accepted as a valid WXR file. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI Analysis
Technical Summary
CVE-2025-13066 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the Demo Importer Plus plugin for WordPress, developed by kraftplugins. The issue arises from inadequate validation of uploaded file types, specifically the failure to correctly identify and block files with double extensions that are intended to appear as legitimate WXR files used for WordPress content import. Authenticated users with author-level privileges or higher can exploit this flaw to upload arbitrary files to the server hosting the WordPress site. Since these files can include executable code, this vulnerability potentially enables remote code execution (RCE), allowing attackers to execute malicious commands on the server, compromise site integrity, steal data, or disrupt availability. The vulnerability affects all versions up to and including 2.0.6 of the plugin. The CVSS 3.1 base score of 8.8 reflects the ease of exploitation (network attack vector, low attack complexity), the requirement for privileges (author-level access), and the high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the presence of this vulnerability in a widely used WordPress plugin makes it a significant risk. The vulnerability was published on December 5, 2025, and no official patches have been linked yet, indicating that users must rely on interim mitigations until a fix is released.
Potential Impact
For European organizations, this vulnerability poses a significant threat, especially those relying on WordPress websites with multiple content authors or contributors. Successful exploitation can lead to unauthorized server access, data breaches, defacement, or complete site takeover. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data exposure), and cause operational disruptions. Since WordPress powers a substantial portion of European websites, including government, educational, and commercial sectors, the risk is widespread. Attackers exploiting this vulnerability could gain persistent access to sensitive information or use the compromised servers as a foothold for further attacks within the network. The lack of public exploits currently limits immediate widespread attacks, but the vulnerability’s high severity and ease of exploitation by authenticated users make it a critical concern for European entities.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Demo Importer Plus plugin and verify its version. Until an official patch is released, restrict author-level and higher permissions to trusted users only, minimizing the number of accounts that can upload files. Implement strict file upload monitoring and logging to detect suspicious activities, especially uploads with double extensions or unusual file types. Employ Web Application Firewalls (WAFs) with custom rules to block unauthorized file uploads and monitor for exploitation attempts. Consider disabling or removing the Demo Importer Plus plugin if it is not essential. Regularly back up website data and server configurations to enable rapid recovery in case of compromise. Stay alert for vendor updates or patches and apply them promptly once available. Additionally, conduct security awareness training for content authors to recognize and report suspicious behavior.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13066: CWE-434 Unrestricted Upload of File with Dangerous Type in kraftplugins Demo Importer Plus
Description
The Demo Importer Plus plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 2.0.6. This is due to insufficient file type validation detecting WXR files, allowing double extension files to bypass sanitization while being accepted as a valid WXR file. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI-Powered Analysis
Technical Analysis
CVE-2025-13066 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the Demo Importer Plus plugin for WordPress, developed by kraftplugins. The issue arises from inadequate validation of uploaded file types, specifically the failure to correctly identify and block files with double extensions that are intended to appear as legitimate WXR files used for WordPress content import. Authenticated users with author-level privileges or higher can exploit this flaw to upload arbitrary files to the server hosting the WordPress site. Since these files can include executable code, this vulnerability potentially enables remote code execution (RCE), allowing attackers to execute malicious commands on the server, compromise site integrity, steal data, or disrupt availability. The vulnerability affects all versions up to and including 2.0.6 of the plugin. The CVSS 3.1 base score of 8.8 reflects the ease of exploitation (network attack vector, low attack complexity), the requirement for privileges (author-level access), and the high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the presence of this vulnerability in a widely used WordPress plugin makes it a significant risk. The vulnerability was published on December 5, 2025, and no official patches have been linked yet, indicating that users must rely on interim mitigations until a fix is released.
Potential Impact
For European organizations, this vulnerability poses a significant threat, especially those relying on WordPress websites with multiple content authors or contributors. Successful exploitation can lead to unauthorized server access, data breaches, defacement, or complete site takeover. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data exposure), and cause operational disruptions. Since WordPress powers a substantial portion of European websites, including government, educational, and commercial sectors, the risk is widespread. Attackers exploiting this vulnerability could gain persistent access to sensitive information or use the compromised servers as a foothold for further attacks within the network. The lack of public exploits currently limits immediate widespread attacks, but the vulnerability’s high severity and ease of exploitation by authenticated users make it a critical concern for European entities.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Demo Importer Plus plugin and verify its version. Until an official patch is released, restrict author-level and higher permissions to trusted users only, minimizing the number of accounts that can upload files. Implement strict file upload monitoring and logging to detect suspicious activities, especially uploads with double extensions or unusual file types. Employ Web Application Firewalls (WAFs) with custom rules to block unauthorized file uploads and monitor for exploitation attempts. Consider disabling or removing the Demo Importer Plus plugin if it is not essential. Regularly back up website data and server configurations to enable rapid recovery in case of compromise. Stay alert for vendor updates or patches and apply them promptly once available. Additionally, conduct security awareness training for content authors to recognize and report suspicious behavior.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-12T13:23:44.451Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693255a910edf2688fec311d
Added to database: 12/5/2025, 3:46:49 AM
Last enriched: 12/12/2025, 5:05:52 AM
Last updated: 1/18/2026, 11:09:06 AM
Views: 107
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1118: SQL Injection in itsourcecode Society Management System
MediumCVE-2025-15537: Heap-based Buffer Overflow in Mapnik
MediumCVE-2025-15536: Heap-based Buffer Overflow in BYVoid OpenCC
MediumCVE-2025-15535: NULL Pointer Dereference in nicbarker clay
MediumCVE-2026-1059: SQL Injection in FeMiner wms
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.