CVE-2025-6207
Published: 05 August 2025
Summary
CVE-2025-6207 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Vjinfotech Wp Import Export Lite. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 43.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Requiring identifiable owners for portable devices reduces the attack surface for unrestricted uploads of dangerous file types via anonymous media.
Dangerous file uploads can be detonated in the chamber to determine malice before any production write or execution occurs.
Prevents unrestricted writing of arbitrary or malicious firmware by keeping hardware write-protect enabled except under tightly controlled manual procedures.
Scans files from external sources on download/open/execute, blocking unrestricted uploads of dangerous file types.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file upload in public-facing WordPress plugin directly enables exploitation of public-facing apps (T1190), ingress of malicious tools/scripts (T1105), and deployment of web shells for RCE (T1505.003).
NVD Description
The WP Import Export Lite plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpie_tempalte_import' function in all versions up to, and including, 3.9.28. This makes it possible for authenticated attackers, with…
more
Subscriber-level access and above, and permissions granted by an Administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Deeper analysisAI
CVE-2025-6207 is an arbitrary file upload vulnerability in the WP Import Export Lite plugin for WordPress, stemming from missing file type validation in the 'wpie_tempalte_import' function. It affects all versions up to and including 3.9.28. The issue is cataloged under CWE-434 (Unrestricted Upload of File with Dangerous Type) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts under certain conditions.
Authenticated attackers with Subscriber-level access or higher, who have been granted permissions by an Administrator, can exploit this vulnerability to upload arbitrary files to the affected site's server. Successful exploitation may enable remote code execution, depending on the file type uploaded and server configuration.
Advisories and references point to the vulnerable code in class-wpie-common-action.php at line 386, a WordPress plugin changeset 3323402 likely addressing the issue, and Wordfence threat intelligence detailing the vulnerability. Security practitioners should update to a patched version beyond 3.9.28 and review user permissions on sites using this plugin.
Details
- CWE(s)