CVE-2025-10058
Published: 17 September 2025
Summary
CVE-2025-10058 is a high-severity External Control of File Name or Path (CWE-73) vulnerability in Wordpress (inferred from references). Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 30.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the insufficient file path validation in the plugin's upload_function, preventing arbitrary file deletion attacks.
Requires timely identification and remediation of the specific flaw in WP Import plugin versions up to 7.27, eliminating the vulnerability through patching.
Enforces least privilege to restrict Subscriber-level users from accessing or deleting critical files even if the plugin is exploited.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vuln in public-facing WP plugin enables remote authenticated file deletion (arbitrary paths) leading to RCE, directly mapping to public app exploitation and file deletion actions.
NVD Description
The WP Import – Ultimate CSV XML Importer for WordPress plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the upload_function() function in all versions up to, and including, 7.27. This makes it…
more
possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Deeper analysisAI
CVE-2025-10058 affects the WP Import – Ultimate CSV XML Importer plugin for WordPress, specifically due to insufficient file path validation in the upload_function() function within all versions up to and including 7.27. This flaw enables arbitrary file deletion on the server. The vulnerability is rated with a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H) and is associated with CWE-73 (External Control of File Name or Path).
Authenticated attackers with Subscriber-level access or higher can exploit this issue remotely over the network with low complexity and no user interaction required. By targeting critical files such as wp-config.php, they can achieve arbitrary file deletion, which readily leads to remote code execution by disrupting server configurations or enabling further compromise.
References, including code from the plugin's Trac repository at tags/7.26 and changesets 3357936 and 3360611, highlight the vulnerable uploadModules/FtpUpload.php file and subsequent modifications. The Wordfence threat intelligence advisory provides further details on the vulnerability.
Details
- CWE(s)