Overview
This report discusses CVE-2025-10040, a severe vulnerability affecting the WP Import – Ultimate CSV XML Importer for WordPress plugin. The vulnerability allows authenticated attackers with Subscriber-level access to retrieve a configured set of SFTP/FTP credentials, leading to potential system compromise or data leakage. It is critical for organizations implementing this plugin to understand and mitigate this issue promptly.
Vulnerability Summary
CVE ID: CVE-2025-10040
Severity: High (CVSS: 7.7)
Attack Vector: Network
Privileges Required: Low (Subscriber-level access)
User Interaction: Required
Impact: Potential system compromise, data leakage
Affected Products
A new way to communicate
Ameeba Chat is built on encrypted identity, not personal profiles.
Message, call, share files, and coordinate with identities kept separate.
- • Encrypted identity
- • Ameeba Chat authenticates access
- • Aliases and categories
- • End-to-end encrypted chat, calls, and files
- • Secure notes for sensitive information
Private communication, rethought.
Product | Affected Versions
WP Import – Ultimate CSV XML Importer for WordPress | Up to and including 7.27
How the Exploit Works
The vulnerability arises from a missing capability check on the ‘get_ftp_details’ AJAX action in the affected plugin. This omission allows authenticated users with Subscriber-level privileges to initiate a network-based attack, making an AJAX call to the ‘get_ftp_details’ endpoint and successfully retrieving a configured set of SFTP/FTP credentials. This unauthorized access can potentially lead to system compromise or data leakage.
Conceptual Example Code
This is a conceptual example of how the vulnerability might be exploited using an AJAX call:
POST /wp-admin/admin-ajax.php?action=get_ftp_details HTTP/1.1
Host: target.example.com
Content-Type: application/x-www-form-urlencoded
Cookie: wordpress_logged_in_[hash]=username|expiry_date|session_token
Mitigation Guidance
To mitigate this vulnerability, users are advised to apply the vendor-provided patch. If a patch is not immediately available or implementable, employing a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can serve as temporary mitigation. This would help monitor and possibly block suspicious activity related to this exploit.
