CVE-2026-2830: CWE-94 Improper Control of Generation of Code ('Code Injection') in wpallimport WP All Import – Drag & Drop Import for CSV, XML, Excel & Google Sheets
CVE-2026-2830 is a medium severity reflected cross-site scripting (XSS) vulnerability in the WP All Import WordPress plugin, affecting all versions up to 4. 0. 0. The flaw arises from insufficient input sanitization and output escaping of the 'filepath' parameter, allowing unauthenticated attackers to inject arbitrary web scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. This vulnerability impacts confidentiality and integrity but does not affect availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or apply mitigations to prevent potential phishing or session hijacking attacks. Countries with significant WordPress usage and e-commerce presence are at higher risk. The CVSS score is 6.
AI Analysis
Technical Summary
CVE-2026-2830 is a reflected cross-site scripting (XSS) vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the WP All Import – Drag & Drop Import for CSV, XML, Excel & Google Sheets plugin for WordPress. This vulnerability exists in all versions up to and including 4.0.0 due to insufficient sanitization and escaping of the 'filepath' parameter. An attacker can craft a malicious URL containing a payload in the 'filepath' parameter, which when visited by an unsuspecting user, causes arbitrary JavaScript code execution within the context of the affected website. This can lead to theft of authentication cookies, session tokens, or other sensitive information, as well as potential manipulation of the webpage content. The vulnerability is exploitable remotely over the network without authentication but requires user interaction (clicking a malicious link). The CVSS v3.1 base score is 6.1, indicating a medium severity level, with attack vector as network, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality and integrity but not availability. No public exploits have been reported yet, but the vulnerability poses a risk especially to sites that rely on this plugin for importing data. The reflected XSS nature means the attack is transient and requires social engineering to succeed. The vulnerability highlights the importance of proper input validation and output encoding in web applications, particularly plugins that handle user-supplied parameters.
Potential Impact
The primary impact of CVE-2026-2830 is on the confidentiality and integrity of affected WordPress sites using the WP All Import plugin. Successful exploitation allows attackers to execute arbitrary scripts in the context of the victim’s browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. This can facilitate further attacks such as privilege escalation or persistent compromise if combined with other vulnerabilities. Although availability is not directly affected, the reputational damage and trust loss from successful attacks can be significant. Since the vulnerability requires user interaction, the attack surface depends on the ability of attackers to lure users into clicking malicious links, often via phishing campaigns. Organizations with high-traffic WordPress sites, especially those handling sensitive user data or e-commerce transactions, face increased risk. The lack of known exploits in the wild currently reduces immediate threat but does not eliminate the risk, especially as attackers often weaponize such vulnerabilities after disclosure. The broad usage of WordPress globally means the potential impact spans many sectors including retail, media, education, and government websites.
Mitigation Recommendations
To mitigate CVE-2026-2830, organizations should first check for updates from the WP All Import plugin vendor and apply any available patches promptly once released. In the absence of an official patch, administrators can implement web application firewall (WAF) rules to detect and block malicious payloads targeting the 'filepath' parameter. Input validation and output encoding should be enforced at the application level to sanitize user-supplied data. Additionally, security teams should educate users about the risks of clicking unsolicited links and implement anti-phishing measures such as email filtering and user awareness training. Employing Content Security Policy (CSP) headers can help reduce the impact of XSS by restricting the execution of unauthorized scripts. Monitoring web server logs for suspicious requests containing unusual 'filepath' parameter values can aid in early detection. Finally, consider restricting plugin usage to trusted administrators and minimizing exposure of vulnerable endpoints by limiting public access where possible.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Netherlands, Japan, Italy, Spain
CVE-2026-2830: CWE-94 Improper Control of Generation of Code ('Code Injection') in wpallimport WP All Import – Drag & Drop Import for CSV, XML, Excel & Google Sheets
Description
CVE-2026-2830 is a medium severity reflected cross-site scripting (XSS) vulnerability in the WP All Import WordPress plugin, affecting all versions up to 4. 0. 0. The flaw arises from insufficient input sanitization and output escaping of the 'filepath' parameter, allowing unauthenticated attackers to inject arbitrary web scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. This vulnerability impacts confidentiality and integrity but does not affect availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or apply mitigations to prevent potential phishing or session hijacking attacks. Countries with significant WordPress usage and e-commerce presence are at higher risk. The CVSS score is 6.
AI-Powered Analysis
Technical Analysis
CVE-2026-2830 is a reflected cross-site scripting (XSS) vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the WP All Import – Drag & Drop Import for CSV, XML, Excel & Google Sheets plugin for WordPress. This vulnerability exists in all versions up to and including 4.0.0 due to insufficient sanitization and escaping of the 'filepath' parameter. An attacker can craft a malicious URL containing a payload in the 'filepath' parameter, which when visited by an unsuspecting user, causes arbitrary JavaScript code execution within the context of the affected website. This can lead to theft of authentication cookies, session tokens, or other sensitive information, as well as potential manipulation of the webpage content. The vulnerability is exploitable remotely over the network without authentication but requires user interaction (clicking a malicious link). The CVSS v3.1 base score is 6.1, indicating a medium severity level, with attack vector as network, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality and integrity but not availability. No public exploits have been reported yet, but the vulnerability poses a risk especially to sites that rely on this plugin for importing data. The reflected XSS nature means the attack is transient and requires social engineering to succeed. The vulnerability highlights the importance of proper input validation and output encoding in web applications, particularly plugins that handle user-supplied parameters.
Potential Impact
The primary impact of CVE-2026-2830 is on the confidentiality and integrity of affected WordPress sites using the WP All Import plugin. Successful exploitation allows attackers to execute arbitrary scripts in the context of the victim’s browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. This can facilitate further attacks such as privilege escalation or persistent compromise if combined with other vulnerabilities. Although availability is not directly affected, the reputational damage and trust loss from successful attacks can be significant. Since the vulnerability requires user interaction, the attack surface depends on the ability of attackers to lure users into clicking malicious links, often via phishing campaigns. Organizations with high-traffic WordPress sites, especially those handling sensitive user data or e-commerce transactions, face increased risk. The lack of known exploits in the wild currently reduces immediate threat but does not eliminate the risk, especially as attackers often weaponize such vulnerabilities after disclosure. The broad usage of WordPress globally means the potential impact spans many sectors including retail, media, education, and government websites.
Mitigation Recommendations
To mitigate CVE-2026-2830, organizations should first check for updates from the WP All Import plugin vendor and apply any available patches promptly once released. In the absence of an official patch, administrators can implement web application firewall (WAF) rules to detect and block malicious payloads targeting the 'filepath' parameter. Input validation and output encoding should be enforced at the application level to sanitize user-supplied data. Additionally, security teams should educate users about the risks of clicking unsolicited links and implement anti-phishing measures such as email filtering and user awareness training. Employing Content Security Policy (CSP) headers can help reduce the impact of XSS by restricting the execution of unauthorized scripts. Monitoring web server logs for suspicious requests containing unusual 'filepath' parameter values can aid in early detection. Finally, consider restricting plugin usage to trusted administrators and minimizing exposure of vulnerable endpoints by limiting public access where possible.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-19T20:40:38.726Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69aa82b7c48b3f10ff296e63
Added to database: 3/6/2026, 7:31:03 AM
Last enriched: 3/6/2026, 7:46:06 AM
Last updated: 3/6/2026, 3:11:03 PM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.