CVE-2025-5061
Published: 05 August 2025
Summary
CVE-2025-5061 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Vjinfotech Wp Import Export Lite. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 30.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the missing file type validation in the wpie_parse_upload_data function by requiring comprehensive input validation for uploaded files to prevent arbitrary uploads.
Ensures timely identification, reporting, and patching of the arbitrary file upload flaw in the WP Import Export Lite plugin versions up to 3.9.29.
Enforces least privilege to restrict Subscriber-level users from receiving administrator-granted permissions needed to access and exploit the vulnerable upload function.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file upload in public-facing WordPress plugin directly enables T1190 exploitation and T1505.003 web shell deployment for RCE.
NVD Description
The WP Import Export Lite plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpie_parse_upload_data' function in all versions up to, and including, 3.9.29. This makes it possible for authenticated attackers, with…
more
Subscriber-level access and above, and permissions granted by an Administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. The vulnerability was partially patched in version 3.9.29.
Deeper analysisAI
CVE-2025-5061 is an arbitrary file upload vulnerability in the WP Import Export Lite plugin for WordPress, stemming from missing file type validation in the 'wpie_parse_upload_data' function. It affects all versions up to and including 3.9.29 and has a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H), mapped to CWE-434 (Unrestricted Upload of File with Dangerous Type).
Authenticated attackers with Subscriber-level access or higher, who have been granted permissions by a site Administrator, can exploit this vulnerability to upload arbitrary files to the affected WordPress site's server. Successful exploitation may enable remote code execution, depending on the uploaded file type and server configuration.
The vulnerability was partially patched in version 3.9.29 of the plugin. Relevant references include code excerpts from the plugin's Trac repository at lines 24 and 89 of class-wpie-upload-validate.php, along with changesets 3323402 and 3338701 detailing modifications, and a Wordfence threat intelligence advisory.
Details
- CWE(s)