Cyber Posture

CVE-2025-5061

High

Published: 05 August 2025

Published
05 August 2025
Modified
13 August 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0061 69.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-5061 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Vjinfotech Wp Import Export Lite. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 30.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the missing file type validation in the wpie_parse_upload_data function by requiring comprehensive input validation for uploaded files to prevent arbitrary uploads.

prevent

Ensures timely identification, reporting, and patching of the arbitrary file upload flaw in the WP Import Export Lite plugin versions up to 3.9.29.

prevent

Enforces least privilege to restrict Subscriber-level users from receiving administrator-granted permissions needed to access and exploit the vulnerable upload function.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Arbitrary file upload in public-facing WordPress plugin directly enables T1190 exploitation and T1505.003 web shell deployment for RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The WP Import Export Lite plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpie_parse_upload_data' function in all versions up to, and including, 3.9.29. This makes it possible for authenticated attackers, with…

more

Subscriber-level access and above, and permissions granted by an Administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. The vulnerability was partially patched in version 3.9.29.

Deeper analysisAI

CVE-2025-5061 is an arbitrary file upload vulnerability in the WP Import Export Lite plugin for WordPress, stemming from missing file type validation in the 'wpie_parse_upload_data' function. It affects all versions up to and including 3.9.29 and has a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H), mapped to CWE-434 (Unrestricted Upload of File with Dangerous Type).

Authenticated attackers with Subscriber-level access or higher, who have been granted permissions by a site Administrator, can exploit this vulnerability to upload arbitrary files to the affected WordPress site's server. Successful exploitation may enable remote code execution, depending on the uploaded file type and server configuration.

The vulnerability was partially patched in version 3.9.29 of the plugin. Relevant references include code excerpts from the plugin's Trac repository at lines 24 and 89 of class-wpie-upload-validate.php, along with changesets 3323402 and 3338701 detailing modifications, and a Wordfence threat intelligence advisory.

Details

CWE(s)

Affected Products

vjinfotech
wp import export lite
≤ 3.9.30

CVEs Like This One

CVE-2025-6207Same product: Vjinfotech Wp Import Export Lite
CVE-2020-36942Shared CWE-434
CVE-2024-57169Shared CWE-434
CVE-2023-53933Shared CWE-434
CVE-2025-68909Shared CWE-434
CVE-2021-47757Shared CWE-434
CVE-2025-68986Shared CWE-434
CVE-2025-56704Shared CWE-434
CVE-2025-0471Shared CWE-434
CVE-2025-7437Shared CWE-434

References