Cyber Posture

CVE-2025-6207

High

Published: 05 August 2025

Published
05 August 2025
Modified
12 August 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0034 56.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-6207 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Vjinfotech Wp Import Export Lite. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 43.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-434

Requiring identifiable owners for portable devices reduces the attack surface for unrestricted uploads of dangerous file types via anonymous media.

addresses: CWE-434

Dangerous file uploads can be detonated in the chamber to determine malice before any production write or execution occurs.

addresses: CWE-434

Prevents unrestricted writing of arbitrary or malicious firmware by keeping hardware write-protect enabled except under tightly controlled manual procedures.

addresses: CWE-434

Scans files from external sources on download/open/execute, blocking unrestricted uploads of dangerous file types.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Arbitrary file upload in public-facing WordPress plugin directly enables exploitation of public-facing apps (T1190), ingress of malicious tools/scripts (T1105), and deployment of web shells for RCE (T1505.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The WP Import Export Lite plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpie_tempalte_import' function in all versions up to, and including, 3.9.28. This makes it possible for authenticated attackers, with…

more

Subscriber-level access and above, and permissions granted by an Administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible.

Deeper analysisAI

CVE-2025-6207 is an arbitrary file upload vulnerability in the WP Import Export Lite plugin for WordPress, stemming from missing file type validation in the 'wpie_tempalte_import' function. It affects all versions up to and including 3.9.28. The issue is cataloged under CWE-434 (Unrestricted Upload of File with Dangerous Type) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts under certain conditions.

Authenticated attackers with Subscriber-level access or higher, who have been granted permissions by an Administrator, can exploit this vulnerability to upload arbitrary files to the affected site's server. Successful exploitation may enable remote code execution, depending on the file type uploaded and server configuration.

Advisories and references point to the vulnerable code in class-wpie-common-action.php at line 386, a WordPress plugin changeset 3323402 likely addressing the issue, and Wordfence threat intelligence detailing the vulnerability. Security practitioners should update to a patched version beyond 3.9.28 and review user permissions on sites using this plugin.

Details

CWE(s)

Affected Products

vjinfotech
wp import export lite
≤ 3.9.29

CVEs Like This One

CVE-2025-5061Same product: Vjinfotech Wp Import Export Lite
CVE-2025-63994Shared CWE-434
CVE-2025-6079Shared CWE-434
CVE-2025-6222Shared CWE-434
CVE-2026-32523Shared CWE-434
CVE-2025-66256Shared CWE-434
CVE-2024-13908Shared CWE-434
CVE-2026-3891Shared CWE-434
CVE-2025-12171Shared CWE-434
CVE-2026-6261Shared CWE-434

References