CVE-2025-13070
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2025-12-11

Assigner: WPScan

Description
The CSV to SortTable WordPress plugin through 4.2 does not validate some shortcode attributes before using them to generate paths passed to include function/s, allowing any authenticated users such as contributor to perform LFI attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2025-12-11
Generated
2026-05-07
AI Q&A
2025-12-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wordpress csv_to_sorttable 4.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the CSV to SortTable WordPress plugin through version 4.2. It occurs because the plugin does not properly validate certain shortcode attributes before using them to generate file paths that are passed to include functions. This flaw allows any authenticated user, including those with contributor-level permissions, to perform Local File Inclusion (LFI) attacks, potentially accessing sensitive files on the server.


How can this vulnerability impact me? :

The vulnerability can allow authenticated users with low-level permissions to perform Local File Inclusion attacks. This means they could potentially read sensitive files on the server, leading to information disclosure, which could compromise the security and integrity of the website and its data.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the WordPress site is running the CSV to SortTable plugin version 4.2 or earlier and if authenticated users with contributor-level permissions can use shortcodes to include arbitrary files. A practical detection method is to attempt to add a shortcode such as [csv src=/malicious.php] in a post or page and see if the file is included and executed. There are no specific network commands provided, but verifying plugin version and testing shortcode behavior in a controlled environment can help detect the vulnerability. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting contributor-level users from adding or editing shortcodes that can include files, removing or disabling the CSV to SortTable plugin if possible, and monitoring for suspicious shortcode usage. Since there is currently no known fix for this vulnerability, limiting user permissions and plugin usage is critical to reduce risk. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart