CVE-2025-12732

4.3 MEDIUM

📋 TL;DR

This vulnerability in the WP Import – Ultimate CSV XML Importer WordPress plugin allows authenticated attackers with Author-level access or higher to extract sensitive information including OpenAI API keys. The flaw exists due to missing authorization checks in the showsetting() function. All WordPress sites using this plugin up to version 7.33 are affected.

💻 Affected Systems

Products:
  • WP Import – Ultimate CSV XML Importer for WordPress
Versions: All versions up to and including 7.33
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin and at least one user with Author-level permissions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal OpenAI API keys and other sensitive credentials, leading to unauthorized API usage, data exfiltration, and potential lateral movement to other systems.

🟠

Likely Case

Author-level users extract OpenAI API keys and other plugin configuration secrets, enabling unauthorized API calls and potential credential reuse attacks.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to potential information disclosure without further system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.34 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3390161/wp-ultimate-csv-importer/trunk/controllers/SendPassword.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WP Import – Ultimate CSV XML Importer'. 4. Click 'Update Now' if available. 5. Alternatively, download version 7.34+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate wp-ultimate-csv-importer

Restrict User Roles

all

Remove Author-level permissions from untrusted users

🧯 If You Can't Patch

  • Remove OpenAI API keys and other sensitive credentials from plugin configuration
  • Implement network segmentation to restrict outbound API calls from WordPress servers

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins

Check Version:

wp plugin get wp-ultimate-csv-importer --field=version

Verify Fix Applied:

Confirm plugin version is 7.34 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to plugin admin pages by Author-level users
  • Multiple failed authorization attempts on admin endpoints

Network Indicators:

  • Unexpected outbound connections to OpenAI API from WordPress server

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND parameters CONTAINS "showsetting" OR plugin="wp-ultimate-csv-importer")

🔗 References

📤 Share & Export