CVE-2026-1317: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in smackcoders WP Import – Ultimate CSV XML Importer for WordPress
The WP Import – Ultimate CSV XML Importer for WordPress plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 7.37. This is due to insufficient escaping on the `file_name` parameter which is stored in the database during file upload and later used in raw SQL queries without proper sanitization. This makes it possible for authenticated attackers with Subscriber-level access or higher to append additional SQL queries into already existing queries via a malicious filename, which can be used to extract sensitive information from the database. The vulnerability can only be exploited when the 'Single Import/Export' option is enabled, and the server is running a PHP version < 8.0.
AI Analysis
Technical Summary
CVE-2026-1317 is a SQL Injection vulnerability identified in the WP Import – Ultimate CSV XML Importer plugin for WordPress, affecting all versions up to and including 7.37. The root cause is insufficient escaping and sanitization of the 'file_name' parameter, which is stored in the database during file upload and later used in raw SQL queries without proper neutralization. An authenticated attacker with at least Subscriber-level privileges can exploit this by uploading a file with a maliciously crafted filename that appends additional SQL commands to existing queries. This can lead to unauthorized extraction of sensitive information from the database. The vulnerability is conditional on two factors: the 'Single Import/Export' option must be enabled in the plugin settings, and the server must be running a PHP version earlier than 8.0, as PHP 8.0+ likely mitigates the issue due to changes in how queries are handled or escaping functions behave. The CVSS 3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality only. There are no known exploits in the wild at this time, but the vulnerability poses a significant risk of data leakage if exploited. The plugin is widely used in WordPress environments, which are common in European organizations, especially those relying on CSV/XML import functionality for content or data management.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive data stored in WordPress databases, including user information, business data, or configuration details. Since exploitation requires authenticated access at Subscriber level or above, attackers who gain or already have low-level access could escalate their capabilities by extracting confidential information. This risk is heightened in environments where the plugin's 'Single Import/Export' feature is enabled and PHP versions below 8.0 are in use, which is common in legacy or unpatched systems. Data leakage could result in compliance violations under GDPR, reputational damage, and potential financial losses. The vulnerability does not directly impact data integrity or availability, but the confidentiality breach alone is significant. Organizations running WordPress sites with this plugin, especially those handling sensitive or regulated data, face increased risk if mitigations are not applied promptly.
Mitigation Recommendations
1. Upgrade the WP Import – Ultimate CSV XML Importer plugin to a version beyond 7.37 once a patch is released or monitor vendor advisories for updates. 2. If immediate patching is not possible, disable the 'Single Import/Export' feature to prevent exploitation. 3. Upgrade the server PHP version to 8.0 or higher, as this mitigates the vulnerability by changing how SQL queries are processed. 4. Implement strict access controls to limit Subscriber-level accounts and monitor for suspicious file upload activities. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'file_name' parameter. 6. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and PHP versions. 7. Educate administrators on the risks of using outdated plugins and encourage timely updates. 8. Review and sanitize all user inputs, including file metadata, as a best practice to reduce injection risks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2026-1317: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in smackcoders WP Import – Ultimate CSV XML Importer for WordPress
Description
The WP Import – Ultimate CSV XML Importer for WordPress plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 7.37. This is due to insufficient escaping on the `file_name` parameter which is stored in the database during file upload and later used in raw SQL queries without proper sanitization. This makes it possible for authenticated attackers with Subscriber-level access or higher to append additional SQL queries into already existing queries via a malicious filename, which can be used to extract sensitive information from the database. The vulnerability can only be exploited when the 'Single Import/Export' option is enabled, and the server is running a PHP version < 8.0.
AI-Powered Analysis
Technical Analysis
CVE-2026-1317 is a SQL Injection vulnerability identified in the WP Import – Ultimate CSV XML Importer plugin for WordPress, affecting all versions up to and including 7.37. The root cause is insufficient escaping and sanitization of the 'file_name' parameter, which is stored in the database during file upload and later used in raw SQL queries without proper neutralization. An authenticated attacker with at least Subscriber-level privileges can exploit this by uploading a file with a maliciously crafted filename that appends additional SQL commands to existing queries. This can lead to unauthorized extraction of sensitive information from the database. The vulnerability is conditional on two factors: the 'Single Import/Export' option must be enabled in the plugin settings, and the server must be running a PHP version earlier than 8.0, as PHP 8.0+ likely mitigates the issue due to changes in how queries are handled or escaping functions behave. The CVSS 3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality only. There are no known exploits in the wild at this time, but the vulnerability poses a significant risk of data leakage if exploited. The plugin is widely used in WordPress environments, which are common in European organizations, especially those relying on CSV/XML import functionality for content or data management.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive data stored in WordPress databases, including user information, business data, or configuration details. Since exploitation requires authenticated access at Subscriber level or above, attackers who gain or already have low-level access could escalate their capabilities by extracting confidential information. This risk is heightened in environments where the plugin's 'Single Import/Export' feature is enabled and PHP versions below 8.0 are in use, which is common in legacy or unpatched systems. Data leakage could result in compliance violations under GDPR, reputational damage, and potential financial losses. The vulnerability does not directly impact data integrity or availability, but the confidentiality breach alone is significant. Organizations running WordPress sites with this plugin, especially those handling sensitive or regulated data, face increased risk if mitigations are not applied promptly.
Mitigation Recommendations
1. Upgrade the WP Import – Ultimate CSV XML Importer plugin to a version beyond 7.37 once a patch is released or monitor vendor advisories for updates. 2. If immediate patching is not possible, disable the 'Single Import/Export' feature to prevent exploitation. 3. Upgrade the server PHP version to 8.0 or higher, as this mitigates the vulnerability by changing how SQL queries are processed. 4. Implement strict access controls to limit Subscriber-level accounts and monitor for suspicious file upload activities. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'file_name' parameter. 6. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and PHP versions. 7. Educate administrators on the risks of using outdated plugins and encourage timely updates. 8. Review and sanitize all user inputs, including file metadata, as a best practice to reduce injection risks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-21T23:41:23.912Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6995b46b80d747be206b6168
Added to database: 2/18/2026, 12:45:31 PM
Last enriched: 2/18/2026, 1:00:31 PM
Last updated: 2/18/2026, 2:46:58 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2654: Server-Side Request Forgery in huggingface smolagents
MediumCVE-2026-1441: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Graylog Graylog Web Interface
MediumCVE-2026-1440: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Graylog Graylog Web Interface
MediumCVE-2026-1439: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Graylog Graylog Web Interface
MediumCVE-2026-1438: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Graylog Graylog Web Interface
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.