CVE-2025-2332

9.8 CRITICAL

📋 TL;DR

This CVE describes a PHP object injection vulnerability in the Export All Posts, Products, Orders, Refunds & Users WordPress plugin. Unauthenticated attackers can exploit it by sending malicious serialized data, but impact requires another plugin/theme with a POP chain to be present. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Export All Posts, Products, Orders, Refunds & Users WordPress plugin
Versions: All versions up to and including 2.13
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires WordPress installation with the vulnerable plugin; impact depends on presence of POP chains in other plugins/themes.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

If combined with a POP chain from another plugin/theme, attackers could achieve remote code execution, delete arbitrary files, or steal sensitive data.

🟠

Likely Case

No impact unless another vulnerable plugin/theme with exploitable POP chain is installed; many sites may have no exploitable chain.

🟢

If Mitigated

With proper plugin management and security controls, risk is minimal as the vulnerability requires specific conditions to be harmful.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires finding or crafting a suitable POP chain from other installed components; no known POP chain exists in the vulnerable plugin itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.13 (check plugin updates)

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3257504/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Export All Posts, Products, Orders, Refunds & Users'. 4. Click 'Update Now' if available, or manually update to latest version. 5. Verify plugin version is above 2.13.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched version is available.

wp plugin deactivate wp-ultimate-exporter

Remove plugin files

linux

Completely remove the plugin from the WordPress installation.

rm -rf /path/to/wordpress/wp-content/plugins/wp-ultimate-exporter/

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block PHP object injection attempts
  • Audit and remove any unnecessary plugins/themes that might provide POP chains

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Export All Posts, Products, Orders, Refunds & Users' version 2.13 or lower.

Check Version:

wp plugin list | grep 'wp-ultimate-exporter'

Verify Fix Applied:

Confirm plugin version is above 2.13 in WordPress admin or via 'wp plugin list' command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress endpoints containing serialized data patterns
  • PHP errors related to unserialize() in web server logs

Network Indicators:

  • HTTP requests with serialized PHP objects in parameters
  • Traffic to plugin-specific endpoints from unexpected sources

SIEM Query:

source="web_logs" AND ("unserialize" OR "O:" OR "C:" OR "a:" IN request_body) AND uri_path="/wp-content/plugins/wp-ultimate-exporter/"

🔗 References

📤 Share & Export