Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13066: CWE-434 Unrestricted Upload of File with Dangerous Type in kraftplugins Demo Importer Plus

0
High
VulnerabilityCVE-2025-13066cvecve-2025-13066cwe-434
Published: Fri Dec 05 2025 (12/05/2025, 03:28:36 UTC)
Source: CVE Database V5
Vendor/Project: kraftplugins
Product: Demo Importer Plus

Description

The Demo Importer Plus plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 2.0.6. This is due to insufficient file type validation detecting WXR files, allowing double extension files to bypass sanitization while being accepted as a valid WXR file. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 12/12/2025, 05:05:52 UTC

Technical Analysis

CVE-2025-13066 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the Demo Importer Plus plugin for WordPress, developed by kraftplugins. The issue arises from inadequate validation of uploaded file types, specifically the failure to correctly identify and block files with double extensions that are intended to appear as legitimate WXR files used for WordPress content import. Authenticated users with author-level privileges or higher can exploit this flaw to upload arbitrary files to the server hosting the WordPress site. Since these files can include executable code, this vulnerability potentially enables remote code execution (RCE), allowing attackers to execute malicious commands on the server, compromise site integrity, steal data, or disrupt availability. The vulnerability affects all versions up to and including 2.0.6 of the plugin. The CVSS 3.1 base score of 8.8 reflects the ease of exploitation (network attack vector, low attack complexity), the requirement for privileges (author-level access), and the high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the presence of this vulnerability in a widely used WordPress plugin makes it a significant risk. The vulnerability was published on December 5, 2025, and no official patches have been linked yet, indicating that users must rely on interim mitigations until a fix is released.

Potential Impact

For European organizations, this vulnerability poses a significant threat, especially those relying on WordPress websites with multiple content authors or contributors. Successful exploitation can lead to unauthorized server access, data breaches, defacement, or complete site takeover. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data exposure), and cause operational disruptions. Since WordPress powers a substantial portion of European websites, including government, educational, and commercial sectors, the risk is widespread. Attackers exploiting this vulnerability could gain persistent access to sensitive information or use the compromised servers as a foothold for further attacks within the network. The lack of public exploits currently limits immediate widespread attacks, but the vulnerability’s high severity and ease of exploitation by authenticated users make it a critical concern for European entities.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the Demo Importer Plus plugin and verify its version. Until an official patch is released, restrict author-level and higher permissions to trusted users only, minimizing the number of accounts that can upload files. Implement strict file upload monitoring and logging to detect suspicious activities, especially uploads with double extensions or unusual file types. Employ Web Application Firewalls (WAFs) with custom rules to block unauthorized file uploads and monitor for exploitation attempts. Consider disabling or removing the Demo Importer Plus plugin if it is not essential. Regularly back up website data and server configurations to enable rapid recovery in case of compromise. Stay alert for vendor updates or patches and apply them promptly once available. Additionally, conduct security awareness training for content authors to recognize and report suspicious behavior.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-12T13:23:44.451Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693255a910edf2688fec311d

Added to database: 12/5/2025, 3:46:49 AM

Last enriched: 12/12/2025, 5:05:52 AM

Last updated: 1/18/2026, 11:09:06 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats