The WP Import Export Lite plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpie_tempalte_import' function in all versions up to, and including, 3.9.28. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an Administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible.
References
Configurations
History
12 Aug 2025, 16:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:vjinfotech:wp_import_export_lite:*:*:*:*:*:wordpress:*:* | |
First Time |
Vjinfotech
Vjinfotech wp Import Export Lite |
|
References | () https://plugins.trac.wordpress.org/browser/wp-import-export-lite/trunk/includes/classes/class-wpie-common-action.php#L386 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3323402/ - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/188eef67-de66-49c2-aa6c-2cf3b886ff66?source=cve - Third Party Advisory |
05 Aug 2025, 14:34
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Aug 2025, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-05 08:15
Updated : 2025-08-12 16:29
NVD link : CVE-2025-6207
Mitre link : CVE-2025-6207
CVE.ORG link : CVE-2025-6207
JSON object : View
Products Affected
vjinfotech
- wp_import_export_lite
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type