CVE-2023-5527

7.4 HIGH

📋 TL;DR

This CSV injection vulnerability in the Business Directory Plugin for WordPress allows authenticated attackers with author-level permissions or higher to embed malicious formulas in exported CSV files. When administrators download and open these files in vulnerable spreadsheet applications like Excel, it can lead to arbitrary code execution on the local system.

💻 Affected Systems

Products:
  • Business Directory Plugin for WordPress
Versions: All versions up to and including 6.4.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Business Directory Plugin enabled and at least one user with author-level permissions or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of administrator workstations through code execution when malicious CSV files are opened in vulnerable spreadsheet software, potentially leading to lateral movement within the network.

🟠

Likely Case

Data theft or malware installation on administrator workstations when malicious CSV files are opened, with potential for credential harvesting or ransomware deployment.

🟢

If Mitigated

Limited to CSV file corruption or formula errors if proper security controls prevent execution of embedded formulas in spreadsheet applications.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with author-level permissions or higher. Attack vectors are well-documented for CSV injection vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.4 and later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3102475/business-directory-plugin/trunk/includes/admin/helpers/csv/class-csv-exporter.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Business Directory Plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 6.4.4+ from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Disable CSV Export

all

Temporarily disable CSV export functionality in the Business Directory Plugin settings

Restrict User Permissions

all

Remove author-level permissions from untrusted users until patch is applied

🧯 If You Can't Patch

  • Configure spreadsheet applications to disable automatic formula execution when opening CSV files
  • Implement strict access controls and monitor for suspicious CSV export activities

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Business Directory Plugin → Version. If version is 6.4.3 or lower, system is vulnerable.

Check Version:

wp plugin list --name='Business Directory Plugin' --field=version

Verify Fix Applied:

Verify plugin version is 6.4.4 or higher in WordPress admin panel. Test CSV export functionality to ensure formulas are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CSV export activities by author-level users
  • Multiple failed CSV export attempts
  • CSV exports containing formula-like patterns

Network Indicators:

  • Large CSV file downloads by administrators
  • Unusual outbound connections after CSV file access

SIEM Query:

source="wordpress" AND (event="csv_export" OR plugin="business-directory-plugin") AND user_role="author"

🔗 References

📤 Share & Export