CVE-2025-12894

5.3 MEDIUM

📋 TL;DR

The Import WP plugin for WordPress exposes sensitive data through unprotected directories. Unauthenticated attackers can access exported/imported files containing potentially confidential information. All WordPress sites using this plugin up to version 2.14.17 are affected.

💻 Affected Systems

Products:
  • Import WP – Export and Import CSV and XML files to WordPress
Versions: All versions up to and including 2.14.17
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and active on WordPress. The vulnerability exists in default configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all exported/imported data including user information, configuration files, database dumps, or other sensitive content stored in the vulnerable directories.

🟠

Likely Case

Exposure of exported user data, content backups, or configuration files that could contain personally identifiable information or system details.

🟢

If Mitigated

Limited exposure if directories contain only non-sensitive test data or if proper access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only web access to the vulnerable directories. No authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.14.18 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3394624%40jc-importer&new=3394624%40jc-importer&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Import WP – Export and Import CSV and XML files to WordPress'. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Add .htaccess protection

linux

Create .htaccess files in /exportwp and /importwp directories to block web access

echo 'Deny from all' > /path/to/wp-content/plugins/jc-importer/exportwp/.htaccess
echo 'Deny from all' > /path/to/wp-content/plugins/jc-importer/importwp/.htaccess

Remove vulnerable directories

linux

Delete or rename the vulnerable directories if not actively using import/export functionality

rm -rf /path/to/wp-content/plugins/jc-importer/exportwp
rm -rf /path/to/wp-content/plugins/jc-importer/importwp

🧯 If You Can't Patch

  • Disable or remove the Import WP plugin entirely
  • Implement web application firewall rules to block access to /exportwp and /importwp paths

🔍 How to Verify

Check if Vulnerable:

Check if /wp-content/plugins/jc-importer/exportwp/ and /wp-content/plugins/jc-importer/importwp/ directories are accessible via web browser without authentication

Check Version:

wp plugin get jc-importer --field=version

Verify Fix Applied:

Verify plugin version is 2.14.18+ and test that /exportwp and /importwp directories return 403 Forbidden or are not accessible

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to /exportwp/* or /importwp/* paths
  • Unusual file downloads from plugin directories
  • Multiple failed authentication attempts followed by directory access

Network Indicators:

  • Unusual traffic patterns to plugin-specific directories
  • Requests for .csv, .xml, .sql, or backup files from unauthorized IPs

SIEM Query:

source="web_access_logs" AND (uri_path="/wp-content/plugins/jc-importer/exportwp/*" OR uri_path="/wp-content/plugins/jc-importer/importwp/*") AND response_code=200

🔗 References

📤 Share & Export