CVE-2025-14478: CWE-611 Improper Restriction of XML External Entity Reference in kraftplugins Demo Importer Plus
The Demo Importer Plus plugin for WordPress is vulnerable to XML External Entity Injection (XXE) in all versions up to, and including, 2.0.9 via the SVG file upload functionality. This makes it possible for authenticated attackers, with Author-level access and above, to achieve code execution in vulnerable configurations. This only impacts sites on versions of PHP older than 8.0.
AI Analysis
Technical Summary
CVE-2025-14478 is an XML External Entity (XXE) injection vulnerability identified in the Demo Importer Plus plugin for WordPress, specifically in versions up to and including 2.0.9. The vulnerability is triggered via the SVG file upload functionality, where the plugin fails to properly restrict XML external entity references (classified under CWE-611). This improper restriction allows an authenticated attacker with Author-level privileges or higher to upload crafted SVG files containing malicious XML entities. When processed by the plugin on servers running PHP versions older than 8.0, these entities can be resolved, leading to potential remote code execution (RCE). The vulnerability is exploitable remotely over the network without requiring user interaction beyond authentication. The CVSS 3.1 base score of 7.5 reflects the ease of exploitation (low attack complexity), no need for privileges beyond Author access, and a significant impact on confidentiality due to possible code execution. However, integrity and availability impacts are not directly indicated. No public exploits have been reported yet, and no patches are currently linked, indicating that mitigation may rely on upgrading PHP or restricting plugin usage until a patch is released. The vulnerability highlights the risks of XML parsing in web applications, especially when combined with file upload features and outdated runtime environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk to WordPress-based websites that utilize the Demo Importer Plus plugin and run on PHP versions older than 8.0. Exploitation could lead to unauthorized code execution, allowing attackers to compromise website confidentiality, potentially leading to data breaches, defacement, or pivoting to internal networks. Organizations in sectors with high web presence such as e-commerce, media, and government are particularly vulnerable. The requirement for Author-level access limits the attack surface but does not eliminate risk, as compromised or malicious insiders could exploit this flaw. The lack of known exploits in the wild currently reduces immediate threat but does not preclude future attacks. Given the widespread use of WordPress in Europe, especially in countries with large SME and public sector deployments, the impact could be broad if not mitigated. Additionally, the vulnerability could be leveraged in targeted attacks against high-value European targets, especially where PHP 7.x or earlier remains in use due to legacy constraints.
Mitigation Recommendations
European organizations should take the following specific steps to mitigate this vulnerability: 1) Immediately audit WordPress sites for the presence of the Demo Importer Plus plugin and identify versions up to 2.0.9. 2) Upgrade PHP runtime environments to version 8.0 or higher, as the vulnerability only affects older PHP versions. 3) Restrict or disable SVG file upload functionality in the plugin or site configuration until a vendor patch is available. 4) Limit user roles and permissions to minimize the number of users with Author-level or higher access, reducing the risk of exploitation. 5) Monitor web server and application logs for suspicious SVG upload attempts or unusual XML processing errors. 6) Employ web application firewalls (WAFs) with rules to detect and block malicious XML payloads or suspicious file uploads. 7) Stay alert for vendor patches or updates to the Demo Importer Plus plugin and apply them promptly once released. 8) Conduct security awareness training for site administrators about the risks of uploading untrusted files. These measures go beyond generic advice by focusing on environment-specific constraints (PHP version) and user role management.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-14478: CWE-611 Improper Restriction of XML External Entity Reference in kraftplugins Demo Importer Plus
Description
The Demo Importer Plus plugin for WordPress is vulnerable to XML External Entity Injection (XXE) in all versions up to, and including, 2.0.9 via the SVG file upload functionality. This makes it possible for authenticated attackers, with Author-level access and above, to achieve code execution in vulnerable configurations. This only impacts sites on versions of PHP older than 8.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-14478 is an XML External Entity (XXE) injection vulnerability identified in the Demo Importer Plus plugin for WordPress, specifically in versions up to and including 2.0.9. The vulnerability is triggered via the SVG file upload functionality, where the plugin fails to properly restrict XML external entity references (classified under CWE-611). This improper restriction allows an authenticated attacker with Author-level privileges or higher to upload crafted SVG files containing malicious XML entities. When processed by the plugin on servers running PHP versions older than 8.0, these entities can be resolved, leading to potential remote code execution (RCE). The vulnerability is exploitable remotely over the network without requiring user interaction beyond authentication. The CVSS 3.1 base score of 7.5 reflects the ease of exploitation (low attack complexity), no need for privileges beyond Author access, and a significant impact on confidentiality due to possible code execution. However, integrity and availability impacts are not directly indicated. No public exploits have been reported yet, and no patches are currently linked, indicating that mitigation may rely on upgrading PHP or restricting plugin usage until a patch is released. The vulnerability highlights the risks of XML parsing in web applications, especially when combined with file upload features and outdated runtime environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk to WordPress-based websites that utilize the Demo Importer Plus plugin and run on PHP versions older than 8.0. Exploitation could lead to unauthorized code execution, allowing attackers to compromise website confidentiality, potentially leading to data breaches, defacement, or pivoting to internal networks. Organizations in sectors with high web presence such as e-commerce, media, and government are particularly vulnerable. The requirement for Author-level access limits the attack surface but does not eliminate risk, as compromised or malicious insiders could exploit this flaw. The lack of known exploits in the wild currently reduces immediate threat but does not preclude future attacks. Given the widespread use of WordPress in Europe, especially in countries with large SME and public sector deployments, the impact could be broad if not mitigated. Additionally, the vulnerability could be leveraged in targeted attacks against high-value European targets, especially where PHP 7.x or earlier remains in use due to legacy constraints.
Mitigation Recommendations
European organizations should take the following specific steps to mitigate this vulnerability: 1) Immediately audit WordPress sites for the presence of the Demo Importer Plus plugin and identify versions up to 2.0.9. 2) Upgrade PHP runtime environments to version 8.0 or higher, as the vulnerability only affects older PHP versions. 3) Restrict or disable SVG file upload functionality in the plugin or site configuration until a vendor patch is available. 4) Limit user roles and permissions to minimize the number of users with Author-level or higher access, reducing the risk of exploitation. 5) Monitor web server and application logs for suspicious SVG upload attempts or unusual XML processing errors. 6) Employ web application firewalls (WAFs) with rules to detect and block malicious XML payloads or suspicious file uploads. 7) Stay alert for vendor patches or updates to the Demo Importer Plus plugin and apply them promptly once released. 8) Conduct security awareness training for site administrators about the risks of uploading untrusted files. These measures go beyond generic advice by focusing on environment-specific constraints (PHP version) and user role management.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-10T18:36:47.883Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696b3d39d302b072d9bbd705
Added to database: 1/17/2026, 7:41:45 AM
Last enriched: 1/17/2026, 7:56:08 AM
Last updated: 1/17/2026, 10:21:09 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0725: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cyberlord92 Integrate Dynamics 365 CRM
MediumCVE-2025-8615: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cubewp1211 CubeWP Framework
MediumCVE-2025-14078: CWE-862 Missing Authorization in shoheitanaka PAYGENT for WooCommerce
MediumCVE-2025-10484: CWE-288 Authentication Bypass Using an Alternate Path or Channel in FmeAddons Registration & Login with Mobile Phone Number for WooCommerce
CriticalCVE-2025-12129: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in cubewp1211 CubeWP Framework
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.