CVE-2025-1912

7.6 HIGH

📋 TL;DR

This Server-Side Request Forgery (SSRF) vulnerability in the Product Import Export for WooCommerce plugin allows authenticated WordPress administrators to make arbitrary web requests from the vulnerable server. Attackers can query and potentially modify internal services that shouldn't be accessible from the web application. Only WordPress sites using vulnerable versions of this specific plugin are affected.

💻 Affected Systems

Products:
  • Product Import Export for WooCommerce – Import Export Product CSV Suite
Versions: All versions up to and including 2.5.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress administrator or higher privileges. The plugin must be installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator-level attackers could access internal services, exfiltrate sensitive data from internal networks, or perform attacks against internal systems that trust the vulnerable WordPress server.

🟠

Likely Case

Attackers with administrator access could scan internal networks, access metadata services, or interact with internal APIs that should be protected from external access.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to services that the WordPress server can already reach, though SSRF could still bypass some application-level restrictions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires administrator-level WordPress credentials. The vulnerability is in the validate_file() function which doesn't properly restrict URL schemes or destinations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.5.1 or later

Vendor Advisory: https://wordpress.org/plugins/product-import-export-for-woo/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Product Import Export for WooCommerce'. 4. Click 'Update Now' if available, or download latest version from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched

wp plugin deactivate product-import-export-for-woo

Restrict administrator accounts

all

Limit administrator accounts to trusted users only and monitor for suspicious activity

🧯 If You Can't Patch

  • Remove administrator access from untrusted users
  • Implement network segmentation to restrict WordPress server's access to internal services

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Product Import Export for WooCommerce. If version is 2.5.0 or lower, you are vulnerable.

Check Version:

wp plugin get product-import-export-for-woo --field=version

Verify Fix Applied:

After updating, verify plugin version is 2.5.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests from WordPress server to internal IPs
  • Multiple failed import/export attempts with unusual URLs

Network Indicators:

  • WordPress server making requests to internal services (169.254.169.254, 10.x, 172.16.x, 192.168.x)
  • Unexpected outbound connections from web server

SIEM Query:

source="wordpress.log" AND ("validate_file" OR "import-ajax" OR "product-import-export") AND (url CONTAINS "http://" OR url CONTAINS "https://")

🔗 References

📤 Share & Export