CVE-2023-5882

8.8 HIGH

📋 TL;DR

This vulnerability in WordPress export plugins allows attackers to bypass CSRF protection and trick logged-in users into performing unauthorized actions, potentially leading to remote code execution. It affects WordPress sites using vulnerable versions of 'Export any WordPress data to XML/CSV' or 'WP All Export Pro' plugins. Attackers can exploit this to compromise websites with administrative users.

💻 Affected Systems

Products:
  • Export any WordPress data to XML/CSV
  • WP All Export Pro
Versions: Export any WordPress data to XML/CSV < 1.4.0, WP All Export Pro < 1.8.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with vulnerable plugin and at least one logged-in user with appropriate permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete website takeover through remote code execution, allowing attackers to deface sites, steal data, install malware, or create backdoors.

🟠

Likely Case

Unauthorized data export, configuration changes, or plugin/theme installation leading to site compromise.

🟢

If Mitigated

Attack fails due to proper CSRF tokens or user authentication checks, resulting in no impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick logged-in users into clicking malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Export any WordPress data to XML/CSV 1.4.0+, WP All Export Pro 1.8.6+

Vendor Advisory: https://wpscan.com/vulnerability/72be4b5c-21be-46af-a3f4-08b4c190a7e2

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Update 'Export any WordPress data to XML/CSV' to version 1.4.0 or higher. 4. Update 'WP All Export Pro' to version 1.8.6 or higher. 5. Verify updates completed successfully.

🔧 Temporary Workarounds

Disable vulnerable plugins

all

Temporarily disable affected plugins until patching is possible

wp plugin deactivate 'export-any-wordpress-data-to-xmlcsv'
wp plugin deactivate 'wp-all-export-pro'

🧯 If You Can't Patch

  • Implement strict access controls and limit administrative users
  • Use web application firewall with CSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins for plugin versions. Vulnerable if Export any WordPress data to XML/CSV < 1.4.0 or WP All Export Pro < 1.8.6.

Check Version:

wp plugin list --fields=name,version

Verify Fix Applied:

Confirm plugin versions show 1.4.0+ for Export any WordPress data to XML/CSV and 1.8.6+ for WP All Export Pro in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual export activity from non-admin users
  • CSRF token validation failures in plugin logs
  • Unexpected plugin activation/deactivation events

Network Indicators:

  • HTTP POST requests to export endpoints without proper referrer headers
  • Multiple failed CSRF validation attempts

SIEM Query:

source="wordpress.log" AND ("export-any-wordpress-data" OR "wp-all-export") AND ("CSRF" OR "nonce" OR "unauthorized")

🔗 References

📤 Share & Export