CVE-2025-6207

7.5 HIGH

📋 TL;DR

The WP Import Export Lite WordPress plugin allows authenticated users with Subscriber-level access or higher to upload arbitrary files due to missing file type validation. This vulnerability can lead to remote code execution on affected WordPress sites. All versions up to and including 3.9.28 are vulnerable.

💻 Affected Systems

Products:
  • WP Import Export Lite WordPress Plugin
Versions: All versions up to and including 3.9.28
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with at least Subscriber role and permissions granted by Administrator.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through remote code execution, allowing attackers to install backdoors, steal data, deface websites, or pivot to other systems.

🟠

Likely Case

Website defacement, malware injection, data theft, or creation of backdoors for persistent access.

🟢

If Mitigated

Limited impact if proper file upload restrictions and user permission controls are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.9.29 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3323402/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WP Import Export Lite. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate wp-import-export-lite

Restrict User Permissions

all

Remove import/export permissions from Subscriber and other non-admin roles.

🧯 If You Can't Patch

  • Implement web application firewall rules to block file uploads to the vulnerable endpoint.
  • Restrict file uploads at server level using .htaccess or web server configuration.

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin panel under Plugins > Installed Plugins.

Check Version:

wp plugin get wp-import-export-lite --field=version

Verify Fix Applied:

Verify plugin version is 3.9.29 or higher and test file upload functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /wp-admin/admin-ajax.php with action=wpie_tempalte_import
  • PHP file uploads from non-admin users

Network Indicators:

  • POST requests to admin-ajax.php with file uploads
  • Suspicious file extensions in upload requests

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND "wpie_tempalte_import" AND ("php" OR "exe" OR "phtml")

🔗 References

📤 Share & Export