CVE-2023-36527

8.8 HIGH

📋 TL;DR

This CVE describes a CSV injection vulnerability in the WordPress Post to CSV plugin by BestWebSoft. Attackers can embed malicious formulas in CSV files that execute when opened in spreadsheet applications like Excel, potentially leading to command execution or data theft. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Post to CSV by BestWebSoft WordPress plugin
Versions: All versions up to and including 1.4.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when plugin is active and CSV export functionality is used. WordPress multisite installations are also affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution on client systems when users open malicious CSV files, potentially leading to full system compromise, data exfiltration, or ransomware deployment.

🟠

Likely Case

Formula execution in spreadsheet applications leading to data manipulation, information disclosure, or limited command execution depending on spreadsheet security settings.

🟢

If Mitigated

Formula warnings appear in spreadsheet applications but no automatic execution occurs if security settings are properly configured.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening CSV file) but CSV injection techniques are well-documented and easy to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.1 or later

Vendor Advisory: https://wordpress.org/plugins/post-to-csv/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Post to CSV by BestWebSoft'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.4.1+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate post-to-csv

Restrict CSV download access

all

Limit CSV export functionality to trusted administrators only

🧯 If You Can't Patch

  • Implement web application firewall rules to detect and block CSV injection payloads
  • Educate users to never open CSV files directly in spreadsheet applications - use text editors or import with data validation

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Post to CSV by BestWebSoft' version 1.4.0 or earlier

Check Version:

wp plugin get post-to-csv --field=version

Verify Fix Applied:

Verify plugin version is 1.4.1 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • CSV export requests with unusual parameters
  • Multiple failed CSV generation attempts

Network Indicators:

  • Unusual CSV download patterns from non-admin users

SIEM Query:

source="wordpress" AND (plugin="post-to-csv" AND version<="1.4.0") OR (url_path="/wp-admin/admin-ajax.php" AND action LIKE "%csv%")

🔗 References

📤 Share & Export