The Export and Import Users and Customers plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the admin_log_page() function in all versions up to, and including, 2.6.2. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary log files on the server.
References
Configurations
History
09 Jul 2025, 17:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/users-customers-import-export-for-wp-woocommerce/trunk/admin/modules/history/history.php#L248 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3259688/ - Patch | |
References | () https://wordpress.org/plugins/users-customers-import-export-for-wp-woocommerce/#developers - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/2d443c70-6537-4c6d-a282-12d392f0f558?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:webtoffee:import_export_wordpress_users:*:*:*:*:*:wordpress:*:* | |
First Time |
Webtoffee import Export Wordpress Users
Webtoffee |
|
Summary |
|
22 Mar 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-22 12:15
Updated : 2025-07-09 17:46
NVD link : CVE-2025-1972
Mitre link : CVE-2025-1972
CVE.ORG link : CVE-2025-1972
JSON object : View
Products Affected
webtoffee
- import_export_wordpress_users
CWE
CWE-73
External Control of File Name or Path