Description
The Demo Importer Plus plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 2.0.6. This is due to insufficient file type validation detecting WXR files, allowing double extension files to bypass sanitization while being accepted as a valid WXR file. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: 2025-12-05
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file upload with potential remote code execution
Action: Patch Now
AI Analysis

Impact

The Demo Importer Plus plugin for WordPress is vulnerable to arbitrary file upload in all versions up to 2.0.6. The flaw arises from insufficient file type validation, which allows double‑extension files to bypass sanitization while being accepted as a valid WXR file. Authenticated attackers with author or higher privileges can upload arbitrary files to the site’s server, potentially enabling remote code execution. This is a classic CWE‑434 file upload vulnerability that threatens confidentiality, integrity, and availability of the affected WordPress environment.

Affected Systems

Kraftplugins’ Demo Importer Plus 2.0.6 and earlier. The vulnerability affects all WordPress sites that have the plugin installed at or below the specified version; no other products are affected. Sites must verify the installed plugin version and ensure it is not within the vulnerable range.

Risk and Exploitability

The flaw carries a CVSS base score of 8.8, classifying it as high severity. The EPSS score of <1% indicates a very low probability of exploitation at this time, and the vulnerability is not listed in the CISA KEV catalog. Nonetheless, legitimate authors or higher role users can exploit the upload bypass to place malicious files on the server, making the risk significant for sites where authors can upload files. Attackers would need user credentials and the author capability; the path requires no additional privileges beyond those granted by the role. Given the severity and the potential for RCE, the vulnerability represents a serious threat if an attacker can gain such credentials or trick a legitimate user into uploading a malicious payload.

Generated by OpenCVE AI on April 21, 2026 at 17:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Demo Importer Plus to a version newer than 2.0.6.
  • Reduce author capabilities by disabling the plugin for non‑admin users or restricting the upload feature to administrators only.
  • Enforce strict file type validation on the server, for example by configuring WordPress or the web server to reject files that do not match the MIME type of WXR files and block double extensions.

Generated by OpenCVE AI on April 21, 2026 at 17:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 05 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 05 Dec 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Kraftplugins
Kraftplugins demo Importer Plus
Wordpress
Wordpress wordpress
Vendors & Products Kraftplugins
Kraftplugins demo Importer Plus
Wordpress
Wordpress wordpress

Fri, 05 Dec 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Demo Importer Plus plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 2.0.6. This is due to insufficient file type validation detecting WXR files, allowing double extension files to bypass sanitization while being accepted as a valid WXR file. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title Demo Importer Plus <= 2.0.6 - Authenticated (Author+) Arbitrary File Upload via WXR Upload Bypass
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Kraftplugins Demo Importer Plus
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:02:59.512Z

Reserved: 2025-11-12T13:23:44.451Z

Link: CVE-2025-13066

cve-icon Vulnrichment

Updated: 2025-12-05T15:58:08.392Z

cve-icon NVD

Status : Deferred

Published: 2025-12-05T04:15:59.757

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13066

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:00:11Z

Weaknesses