CVE-2025-13070
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-11
Assigner: WPScan
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | csv_to_sorttable | 4.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the CSV to SortTable WordPress plugin through version 4.2. It occurs because the plugin does not properly validate certain shortcode attributes before using them to generate file paths that are passed to include functions. This flaw allows any authenticated user, including those with contributor-level permissions, to perform Local File Inclusion (LFI) attacks, potentially accessing sensitive files on the server.
How can this vulnerability impact me? :
The vulnerability can allow authenticated users with low-level permissions to perform Local File Inclusion attacks. This means they could potentially read sensitive files on the server, leading to information disclosure, which could compromise the security and integrity of the website and its data.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if the WordPress site is running the CSV to SortTable plugin version 4.2 or earlier and if authenticated users with contributor-level permissions can use shortcodes to include arbitrary files. A practical detection method is to attempt to add a shortcode such as [csv src=/malicious.php] in a post or page and see if the file is included and executed. There are no specific network commands provided, but verifying plugin version and testing shortcode behavior in a controlled environment can help detect the vulnerability. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting contributor-level users from adding or editing shortcodes that can include files, removing or disabling the CSV to SortTable plugin if possible, and monitoring for suspicious shortcode usage. Since there is currently no known fix for this vulnerability, limiting user permissions and plugin usage is critical to reduce risk. [1]