An unrestricted file upload vulnerability exists in the...
Critical severity
Unreviewed
Published
Jul 9, 2025
to the GitHub Advisory Database
•
Updated Jul 9, 2025
Description
Published by the National Vulnerability Database
Jul 9, 2025
Published to the GitHub Advisory Database
Jul 9, 2025
Last updated
Jul 9, 2025
An unrestricted file upload vulnerability exists in the WordPress AIT CSV Import/Export plugin ≤ 3.0.3. The plugin exposes an upload handler at upload-handler.php that allows arbitrary file upload via a multipart/form-data POST request. This endpoint does not enforce authentication or content-type validation, enabling attackers to upload malicious PHP code directly to the server. Although the upload may produce an error related to CSV parsing, the malicious file is still saved under wp-content/uploads/ and remains executable. Notably, the plugin does not need to be active for exploitation to succeed.
References