CVE-2025-10057
BaseFortify
Publication date: 2025-09-17
Last updated on: 2025-09-17
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpres | wp_ultimate_csv_importer | 7.25 |
| wordpres | wp_ultimate_csv_importer | 7.28 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the WP Import β Ultimate CSV XML Importer for WordPress plugin up to version 7.28. It allows authenticated users with Subscriber-level access or higher to inject unfiltered PHP code into a file named customFunction.php via the write_to_customfile() function. This injected code can then be executed remotely, leading to Remote Code Execution (RCE).
How can this vulnerability impact me? :
An attacker with at least Subscriber-level access can execute arbitrary PHP code on the affected WordPress site remotely. This can lead to full compromise of the website, including data theft, site defacement, installation of malware, or further attacks on the hosting environment.