
Cloud Vulnerability DB
A community-led vulnerabilities database
The Catalog Importer, Scraper & Crawler plugin for WordPress (CVE-2025-8417) contains a PHP code injection vulnerability affecting all versions up to and including 5.1.4. The vulnerability was disclosed on September 11, 2025, and impacts WordPress installations using the affected plugin (NVD).
The vulnerability stems from the plugin's reliance on a guessable numeric token (e.g., ?key=900001705) without proper authentication, combined with unsafe use of eval() on user-supplied input. The severity is rated as HIGH with a CVSS v3.1 base score of 8.1 (Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). The vulnerability is classified as CWE-94 (Improper Control of Generation of Code) (NVD).
This vulnerability allows unauthenticated attackers to execute arbitrary PHP code on the server through forged requests, provided they can guess or brute-force the numeric key. The successful exploitation could lead to complete system compromise with high impacts on confidentiality, integrity, and availability (NVD).
Users should immediately update the Catalog Importer, Scraper & Crawler plugin to a version newer than 5.1.4 if available. If an update is not available, it is recommended to remove the plugin until a patched version is released (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."