CVE-2025-8767
📋 TL;DR
The AnWP Football Leagues WordPress plugin contains a CSV injection vulnerability that allows authenticated administrators to embed malicious formulas in exported CSV files. When these files are downloaded and opened in vulnerable spreadsheet applications (like Excel), they can execute arbitrary code on the user's system. This affects all WordPress sites using the plugin up to version 0.16.17.
💻 Affected Systems
- AnWP Football Leagues WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
An attacker with administrator access could craft CSV files containing malicious formulas that execute arbitrary code on victims' systems when opened, potentially leading to full system compromise.
Likely Case
Malicious administrators could export CSV files containing formulas that execute commands or steal data when opened by other users in vulnerable spreadsheet applications.
If Mitigated
With proper input validation and output escaping, CSV exports would contain sanitized data that cannot trigger formula execution.
🎯 Exploit Status
Exploitation requires administrator access and depends on victim opening CSV files in vulnerable spreadsheet applications with automatic formula execution enabled.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 0.16.18 or later
Vendor Advisory: http://plugins.trac.wordpress.org/changeset/3342787/football-leagues-by-anwppro/trunk/includes/class-anwpfl-data-port.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'AnWP Football Leagues'
4. Click 'Update Now' if available
5. If no update appears, download version 0.16.18+ from WordPress.org and manually update
🔧 Temporary Workarounds
Disable CSV export functionality
allTemporarily disable the vulnerable CSV export features until patching is possible
Add to wp-config.php: define('ANWPFL_DISABLE_CSV_EXPORT', true);
Restrict administrator access
allReview and minimize administrator accounts to reduce attack surface
🧯 If You Can't Patch
- Implement strict access controls to limit who has administrator privileges
- Educate users to never open CSV files from untrusted sources in spreadsheet applications with automatic formula execution
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → AnWP Football Leagues → Version. If version is 0.16.17 or lower, you are vulnerable.
Check Version:
wp plugin list --name='football-leagues-by-anwppro' --field=version
Verify Fix Applied:
After updating, verify version is 0.16.18 or higher in WordPress plugins list.
📡 Detection & Monitoring
Log Indicators:
- Multiple CSV export requests from same administrator account
- Unusual CSV download patterns
Network Indicators:
- CSV file downloads containing formula characters (=, +, -, @) in data fields
SIEM Query:
source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND parameters CONTAINS "download_csv_players" OR parameters CONTAINS "download_csv_games")
🔗 References
- http://plugins.trac.wordpress.org/changeset/3342787/football-leagues-by-anwppro/trunk/includes/class-anwpfl-data-port.php
- https://plugins.trac.wordpress.org/browser/football-leagues-by-anwppro/trunk/includes/class-anwpfl-data-port.php#L265
- https://plugins.trac.wordpress.org/browser/football-leagues-by-anwppro/trunk/includes/class-anwpfl-data-port.php#L58
- https://plugins.trac.wordpress.org/browser/football-leagues-by-anwppro/trunk/includes/class-anwpfl-data-port.php#L93
- https://www.wordfence.com/threat-intel/vulnerabilities/id/04676263-cdad-40cd-bb54-61beb727e09d?source=cve