
Cloud Vulnerability DB
A community-led vulnerabilities database
The Import any XML, CSV or Excel File to WordPress (WP All Import) plugin for WordPress is vulnerable to Remote Code Execution in versions prior to 4.0.0. The vulnerability was discovered by researcher tmrswrr and was disclosed on November 12, 2025 (Wordfence Intel).
The vulnerability exists in the plugin's PHP code execution capabilities. The issue was addressed in version 4.0.0 by implementing restrictions on PHP execution when both DISALLOWFILEEDIT and DISALLOWFILEMODS WordPress security constants are set to true, creating a security boundary where the plugin would no longer grant new code execution capabilities (WordPress Plugin).
If exploited, this vulnerability could allow authenticated users with admin privileges to execute arbitrary PHP code on the affected WordPress installation, potentially leading to complete site compromise.
The vulnerability has been patched in version 4.0.0 of the WP All Import plugin. Site administrators should update to this version immediately. Additionally, setting both DISALLOWFILEEDIT and DISALLOWFILEMODS constants to true in wp-config.php will prevent PHP execution through the plugin (WordPress Plugin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."