CVE-2022-42882

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to inject malicious formulas into CSV files exported by the Simple CSV/XLS Exporter WordPress plugin. When victims open these CSV files in spreadsheet applications like Excel, the formulas can execute commands or access data. This affects WordPress sites using the plugin versions up to 1.5.8.

💻 Affected Systems

Products:
  • Simple CSV/XLS Exporter WordPress Plugin
Versions: n/a through 1.5.8
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to exploit. Affects all WordPress installations using vulnerable plugin versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary commands on victims' systems when they open malicious CSV files, potentially leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Attackers trick users into opening CSV files that execute malicious formulas, potentially stealing credentials, accessing local files, or performing unauthorized actions.

🟢

If Mitigated

With proper user education about not opening untrusted CSV files and using text-only CSV viewers, impact is limited to potential data leakage from formula execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to WordPress. CSV injection techniques are well-documented and easy to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.9 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/simple-csv-xls-exporter/wordpress-simple-csv-xls-exporter-plugin-1-5-8-authenticated-csv-injection-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Simple CSV/XLS Exporter. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin, then install fresh version 1.5.9+ from WordPress repository.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate simple-csv-xls-exporter

Restrict User Access

all

Limit plugin access to trusted administrators only

Use WordPress role management to restrict 'export' capabilities

🧯 If You Can't Patch

  • Implement strict user education about not opening CSV files from untrusted sources in spreadsheet applications
  • Configure spreadsheet applications to disable automatic formula execution when opening CSV files

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Simple CSV/XLS Exporter → Version. If version is 1.5.8 or earlier, system is vulnerable.

Check Version:

wp plugin get simple-csv-xls-exporter --field=version

Verify Fix Applied:

Verify plugin version is 1.5.9 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Multiple CSV export requests from single user
  • Unusual export patterns or times

Network Indicators:

  • CSV file downloads containing formula characters (=, +, -, @) at beginning of cells

SIEM Query:

source="wordpress" AND (plugin="simple-csv-xls-exporter" AND version<="1.5.8")

🔗 References

📤 Share & Export