Cyber Posture

CVE-2024-7419

HighRCE

Published: 07 February 2025

Published
07 February 2025
Modified
11 February 2025
KEV Added
Patch
CVSS Score 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0171 82.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-7419 is a high-severity Code Injection (CWE-94) vulnerability in Soflyy Wp All Export. Its CVSS base score is 8.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 17.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the missing input validation and sanitization of user-supplied data in custom export fields, preventing arbitrary PHP code injection.

prevent

Requires identification, reporting, and correction of the specific RCE flaw in WP ALL Export Pro versions up to 1.9.1 via patching.

detect

Scans the system for vulnerabilities like CVE-2024-7419 in plugins, enabling timely detection and remediation before exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Direct RCE via unauthenticated code injection in public-facing WordPress plugin matches T1190 (Exploit Public-Facing Application).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The WP ALL Export Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.9.1 via the custom export fields. This is due to the missing input validation and sanitization of user-supplied data.…

more

This makes it possible for unauthenticated attackers to inject arbitrary PHP code into form fields that get executed on the server during the export, potentially leading to a complete site compromise. As a prerequisite, the custom export field should include fields containing user-supplied data.

Deeper analysisAI

CVE-2024-7419 is a remote code execution (RCE) vulnerability affecting the WP ALL Export Pro plugin for WordPress in all versions up to and including 1.9.1. The flaw stems from missing input validation and sanitization of user-supplied data in custom export fields, classified under CWE-94 (Code Injection). It carries a CVSS v3.1 base score of 8.3 (AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H), indicating high severity due to its potential for network-based exploitation with scope change and high impacts across confidentiality, integrity, and availability.

Unauthenticated attackers (PR:N) can exploit this vulnerability by injecting arbitrary PHP code into form fields containing user-supplied data, provided the custom export field includes such fields as a prerequisite. The attack requires high complexity (AC:H) and user interaction (UI:R), such as a site administrator triggering the export process. Successful exploitation leads to PHP code execution on the server, potentially resulting in complete site compromise.

Advisories from Wordfence detail the vulnerability in their threat intelligence report, while the plugin vendor at WP All Import recommends upgrading to a patched version of WP ALL Export Pro beyond 1.9.1 to mitigate the issue. Security practitioners should verify and apply updates promptly, especially for sites using custom export configurations with user-supplied data.

Details

CWE(s)

Affected Products

soflyy
wp all export
≤ 1.9.2

CVEs Like This One

CVE-2024-7425Same product: Soflyy Wp All Export
CVE-2025-23209Shared CWE-94
CVE-2026-39440Shared CWE-94
CVE-2026-3300Shared CWE-94
CVE-2025-6389Shared CWE-94
CVE-2025-8723Shared CWE-94
CVE-2025-34277Shared CWE-94
CVE-2025-57141Shared CWE-94
CVE-2024-48818Shared CWE-94
CVE-2025-10679Shared CWE-94

References