CVE-2025-13145: CWE-502 Deserialization of Untrusted Data in smackcoders WP Import – Ultimate CSV XML Importer for WordPress
The WP Import – Ultimate CSV XML Importer for WordPress plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 7.33.1. This is due to deserialization of untrusted data supplied via CSV file imports in the import_single_post_as_csv function within SingleImportExport.php. This makes it possible for authenticated attackers, with administrator-level access or higher, to inject a PHP object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
AI Analysis
Technical Summary
CVE-2025-13145 is a vulnerability classified under CWE-502 (Deserialization of Untrusted Data) found in the WP Import – Ultimate CSV XML Importer plugin for WordPress, maintained by smackcoders. The flaw exists in the import_single_post_as_csv function within SingleImportExport.php, which deserializes PHP objects from CSV file imports without proper validation or sanitization. This unsafe deserialization enables an attacker with administrator privileges to inject crafted PHP objects. The vulnerability is exploitable remotely over the network (AV:N) with low attack complexity (AC:L), but requires high privileges (PR:H) and no user interaction (UI:N). The scope is unchanged (S:U), and the impact is high across confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation depends on the presence of a gadget chain (POP chain) in other plugins or themes installed on the WordPress instance, which can be leveraged to execute arbitrary code, delete files, or access sensitive data. Although no known exploits are currently in the wild, the vulnerability poses a significant risk due to the widespread use of WordPress and the plugin's functionality in importing content. The CVSS v3.1 base score is 7.2, indicating a high severity level. The vulnerability affects all versions up to and including 7.33.1, with no patch currently available at the time of publication. The vulnerability was published on November 19, 2025, and was reserved on November 13, 2025. The plugin's role in content importation makes it a critical component in many WordPress deployments, increasing the attack surface for sites that allow administrator-level users to import CSV files.
Potential Impact
For European organizations, this vulnerability can lead to severe consequences including unauthorized disclosure of sensitive data, website defacement, loss of data integrity, and potential full system compromise via remote code execution. Organizations relying on WordPress for their web presence, e-commerce, or content management are particularly at risk. The requirement for administrator-level access limits the attack vector to insiders or compromised credentials, but once exploited, the attacker can manipulate site content, delete critical files, or implant backdoors. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance under GDPR if personal data is exposed. The lack of a patch at the time of disclosure means organizations must rely on compensating controls. Given the popularity of WordPress in Europe, especially among SMEs and public sector entities, the threat is significant. Additionally, attackers could leverage this vulnerability as part of a multi-stage attack chain targeting European digital infrastructure.
Mitigation Recommendations
1. Immediately restrict administrator-level access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Monitor and audit all CSV import activities and administrator actions within WordPress to detect suspicious behavior. 3. Temporarily disable or remove the WP Import – Ultimate CSV XML Importer plugin until a security patch is released. 4. Review and harden the WordPress environment by minimizing installed plugins and themes to reduce the availability of gadget chains necessary for exploitation. 5. Implement web application firewalls (WAF) with custom rules to detect and block suspicious deserialization payloads or unusual CSV import requests. 6. Keep WordPress core and all plugins/themes updated to the latest versions to reduce attack surface. 7. Conduct regular backups of website data and configuration to enable recovery in case of compromise. 8. Once a patch is available from smackcoders, apply it promptly and verify the fix in a staging environment before production deployment. 9. Educate administrators on the risks of importing untrusted CSV files and enforce strict validation of import sources.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13145: CWE-502 Deserialization of Untrusted Data in smackcoders WP Import – Ultimate CSV XML Importer for WordPress
Description
The WP Import – Ultimate CSV XML Importer for WordPress plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 7.33.1. This is due to deserialization of untrusted data supplied via CSV file imports in the import_single_post_as_csv function within SingleImportExport.php. This makes it possible for authenticated attackers, with administrator-level access or higher, to inject a PHP object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
AI-Powered Analysis
Technical Analysis
CVE-2025-13145 is a vulnerability classified under CWE-502 (Deserialization of Untrusted Data) found in the WP Import – Ultimate CSV XML Importer plugin for WordPress, maintained by smackcoders. The flaw exists in the import_single_post_as_csv function within SingleImportExport.php, which deserializes PHP objects from CSV file imports without proper validation or sanitization. This unsafe deserialization enables an attacker with administrator privileges to inject crafted PHP objects. The vulnerability is exploitable remotely over the network (AV:N) with low attack complexity (AC:L), but requires high privileges (PR:H) and no user interaction (UI:N). The scope is unchanged (S:U), and the impact is high across confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation depends on the presence of a gadget chain (POP chain) in other plugins or themes installed on the WordPress instance, which can be leveraged to execute arbitrary code, delete files, or access sensitive data. Although no known exploits are currently in the wild, the vulnerability poses a significant risk due to the widespread use of WordPress and the plugin's functionality in importing content. The CVSS v3.1 base score is 7.2, indicating a high severity level. The vulnerability affects all versions up to and including 7.33.1, with no patch currently available at the time of publication. The vulnerability was published on November 19, 2025, and was reserved on November 13, 2025. The plugin's role in content importation makes it a critical component in many WordPress deployments, increasing the attack surface for sites that allow administrator-level users to import CSV files.
Potential Impact
For European organizations, this vulnerability can lead to severe consequences including unauthorized disclosure of sensitive data, website defacement, loss of data integrity, and potential full system compromise via remote code execution. Organizations relying on WordPress for their web presence, e-commerce, or content management are particularly at risk. The requirement for administrator-level access limits the attack vector to insiders or compromised credentials, but once exploited, the attacker can manipulate site content, delete critical files, or implant backdoors. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance under GDPR if personal data is exposed. The lack of a patch at the time of disclosure means organizations must rely on compensating controls. Given the popularity of WordPress in Europe, especially among SMEs and public sector entities, the threat is significant. Additionally, attackers could leverage this vulnerability as part of a multi-stage attack chain targeting European digital infrastructure.
Mitigation Recommendations
1. Immediately restrict administrator-level access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Monitor and audit all CSV import activities and administrator actions within WordPress to detect suspicious behavior. 3. Temporarily disable or remove the WP Import – Ultimate CSV XML Importer plugin until a security patch is released. 4. Review and harden the WordPress environment by minimizing installed plugins and themes to reduce the availability of gadget chains necessary for exploitation. 5. Implement web application firewalls (WAF) with custom rules to detect and block suspicious deserialization payloads or unusual CSV import requests. 6. Keep WordPress core and all plugins/themes updated to the latest versions to reduce attack surface. 7. Conduct regular backups of website data and configuration to enable recovery in case of compromise. 8. Once a patch is available from smackcoders, apply it promptly and verify the fix in a staging environment before production deployment. 9. Educate administrators on the risks of importing untrusted CSV files and enforce strict validation of import sources.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-13T19:07:19.403Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691d6898a27e6d5e91bc24d2
Added to database: 11/19/2025, 6:50:00 AM
Last enriched: 11/19/2025, 6:53:27 AM
Last updated: 11/19/2025, 9:55:37 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11230: CWE-407 Inefficient Algorithmic Complexity in HAProxy Technologies HAProxy Community Edition
HighCVE-2025-11446: CWE-532 Insertion of Sensitive Information into Log File in upKeeper Solutions upKeeper Manager
HighCVE-2025-13206: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in stellarwp GiveWP – Donation Plugin and Fundraising Platform
HighCVE-2025-13035: CWE-94 Improper Control of Generation of Code ('Code Injection') in codesnippetspro Code Snippets
HighCVE-2025-12484: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smub Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.