CVE-2023-7082
📋 TL;DR
The Import any XML or CSV File to WordPress plugin before version 3.7.3 has a vulnerability that allows administrators to upload ZIP files containing executable code, which gets automatically extracted to a publicly accessible directory. This can lead to remote code execution on the WordPress site. Only WordPress sites using vulnerable versions of this specific plugin are affected.
💻 Affected Systems
- Import any XML or CSV File to WordPress
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An attacker with administrator credentials could upload malicious PHP files, gain full control of the WordPress server, and potentially compromise the entire hosting environment.
Likely Case
Compromised administrator accounts could upload web shells, leading to data theft, defacement, or further network penetration.
If Mitigated
With proper access controls and monitoring, exploitation would be detected and contained before significant damage occurs.
🎯 Exploit Status
Exploitation requires administrator credentials. The vulnerability is straightforward to exploit once credentials are obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.7.3
Vendor Advisory: https://wpscan.com/vulnerability/7f947305-7a72-4c59-9ae8-193f437fd04e/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Import any XML or CSV File to WordPress'. 4. Click 'Update Now' if available, or manually update to version 3.7.3 or later.
🔧 Temporary Workarounds
Disable the vulnerable plugin
allTemporarily deactivate the plugin until it can be updated to a secure version.
wp plugin deactivate import-any-xml-or-csv-file-to-wordpress
Restrict file uploads
linuxUse .htaccess or web server configuration to block execution of uploaded files in the uploads directory.
<FilesMatch "\.(php|php5|php7|phtml|phar)$">
Order Allow,Deny
Deny from all
</FilesMatch>
🧯 If You Can't Patch
- Remove administrator access from untrusted users and implement strong password policies
- Implement file integrity monitoring on the WordPress uploads directory
🔍 How to Verify
Check if Vulnerable:
Check the plugin version in WordPress admin under Plugins > Installed Plugins. If version is below 3.7.3, the site is vulnerable.
Check Version:
wp plugin get import-any-xml-or-csv-file-to-wordpress --field=version
Verify Fix Applied:
Confirm the plugin version is 3.7.3 or higher in the WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /wp-content/uploads/ directory
- Administrator account login from unexpected locations
- Execution of PHP files in uploads directory
Network Indicators:
- HTTP POST requests to plugin upload endpoints with ZIP files
- Requests to suspicious PHP files in uploads directory
SIEM Query:
source="web_server" AND (uri="/wp-admin/admin-ajax.php" AND post_data CONTAINS "action=import_any_xml_csv_file" OR uri MATCHES "/wp-content/uploads/.*\.php$")