CVE-2022-1565

7.2 HIGH

📋 TL;DR

The WP All Import WordPress plugin up to version 3.6.7 contains a vulnerability that allows authenticated attackers with administrator-level permissions to upload arbitrary files via the wp_all_import_get_gz.php file due to missing file type validation. This can lead to remote code execution on affected WordPress sites. Only WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • WP All Import WordPress Plugin
Versions: Up to and including 3.6.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have administrator-level WordPress permissions. The vulnerability exists in the default plugin configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through remote code execution, allowing attackers to install backdoors, steal data, deface websites, or use the server for malicious activities.

🟠

Likely Case

Attackers upload web shells or malicious scripts to gain persistent access, execute arbitrary commands, and potentially pivot to other systems.

🟢

If Mitigated

No impact if proper access controls, file upload restrictions, and security monitoring are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials but is technically simple once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.6.8 and later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2749264/wp-all-import/trunk

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WP All Import. 4. Click 'Update Now' if available, or download version 3.6.8+ from WordPress.org. 5. Replace the plugin files manually if automatic update fails.

🔧 Temporary Workarounds

Remove vulnerable file

linux

Delete or rename the vulnerable wp_all_import_get_gz.php file to prevent exploitation

rm /path/to/wp-content/plugins/wp-all-import/wp_all_import_get_gz.php

Restrict file uploads

all

Implement web application firewall rules to block suspicious file uploads to the plugin directory

🧯 If You Can't Patch

  • Disable or remove the WP All Import plugin entirely
  • Implement strict access controls and monitoring for administrator accounts

🔍 How to Verify

Check if Vulnerable:

Check if wp_all_import_get_gz.php exists in /wp-content/plugins/wp-all-import/ and verify plugin version is 3.6.7 or earlier

Check Version:

grep -r 'Version:' /path/to/wp-content/plugins/wp-all-import/wp-all-import.php | cut -d: -f2

Verify Fix Applied:

Confirm wp_all_import_get_gz.php file has been removed or modified, and plugin version shows 3.6.8 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /wp-content/plugins/wp-all-import/
  • POST requests to wp_all_import_get_gz.php with suspicious file extensions
  • Administrator account login from unusual locations

Network Indicators:

  • HTTP requests containing file uploads to the vulnerable endpoint
  • Traffic patterns suggesting web shell communication

SIEM Query:

source="web_logs" AND (uri="/wp-content/plugins/wp-all-import/wp_all_import_get_gz.php" OR uri CONTAINS "wp_all_import_get_gz") AND (method="POST" OR file_extension IN ["php", "jsp", "asp", "exe"])

🔗 References

📤 Share & Export