This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Unauthenticated Arbitrary File Upload in `Cpiwm_Import_Controller::import`.β¦
π‘οΈ **Root Cause**: Missing file type validation. <br>π **CWE**: **CWE-434** (Unrestricted Upload of File with Dangerous Type). <br>β **Flaw**: The plugin accepts any file extension without checking if it's safe.
π **Threshold**: **VERY LOW**. <br>π **Auth**: **None required** (Unauthenticated). <br>βοΈ **Config**: Default installation is vulnerable. <br>π― **Ease**: Trivial for any attacker with network access.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Exploit Available**: **YES**. <br>π **PoC**: Public on GitHub (`Nxploited/CVE-2025-11170`). <br>π **Status**: Active exploitation risk is **HIGH** due to easy access.
π§ **Workaround (No Patch)**: <br>1. **Disable/Deactivate** the plugin immediately. <br>2. **Block** the import endpoint via WAF. <br>3. Restrict file uploads via `wp-config.php` or server config. <br>4.β¦