First published: Fri Aug 04 2023(Updated: )
The WP Ultimate CSV Importer plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 7.9.8 via the '->cus1' parameter. This allows authenticated attackers with author-level permissions or above, if the administrator previously grants access in the plugin settings, to execute code on the server. The author resolved this vulnerability by removing the ability for authors and editors to import files, please note that this means remote code execution is still possible for site administrators, use the plugin with caution.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Smackcoders Wp Ultimate Csv Importer | <=7.9.8 | |
<=7.9.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4142 is a vulnerability in the WP Ultimate CSV Importer plugin for WordPress that allows authenticated attackers with author-level permissions or above to execute remote code.
The severity of CVE-2023-4142 is high, with a severity value of 8.
CVE-2023-4142 affects versions up to and including 7.9.8 of the WP Ultimate CSV Importer plugin for WordPress.
An authenticated attacker with author-level permissions or above can exploit CVE-2023-4142 by using the '->cus1' parameter.
Yes, you can find references related to CVE-2023-4142 at the following URLs: [Reference 1](https://www.wordfence.com/threat-intel/vulnerabilities/id/db1bad2e-55df-40c5-9a3f-651858a19b42?source=cve), [Reference 2](https://plugins.trac.wordpress.org/changeset/2944635/wp-ultimate-csv-importer/trunk/wp-ultimate-csv-importer.php), [Reference 3](https://plugins.trac.wordpress.org/browser/wp-ultimate-csv-importer/tags/7.9.6/importExtensions/ImportHelpers.php#L205).