CVE-2025-11170
Published: 11 November 2025
Description
The WP移行専用プラグイン for CPI plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the Cpiwm_Import_Controller::import function in all versions up to, and including, 1.0.2. This makes it possible for unauthenticated attackers to upload…
more
arbitrary files on the affected site's server which may make remote code execution possible.
Mitigating Controls (NIST 800-53 r5)AI
Directly enforces file type and content validation on uploads, addressing the missing validation in the plugin's import function that enables arbitrary file uploads.
Mandates timely identification, reporting, and correction of the specific flaw in the WP移行専用プラグイン for CPI plugin up to version 1.0.2.
Scans uploaded files for malicious code at entry points, preventing remote code execution from dangerous files uploaded via the vulnerable import function.
Security SummaryAI
CVE-2025-11170 is an arbitrary file upload vulnerability in the WP移行専用プラグイン for CPI plugin for WordPress, affecting all versions up to and including 1.0.2. The flaw arises from missing file type validation in the Cpiwm_Import_Controller::import function, allowing attackers to upload arbitrary files to the affected site's server. It is rated critical with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type). The vulnerability was published on 2025-11-11.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction or privileges required. By leveraging the import function, they can upload malicious files, which may lead to remote code execution on the server depending on the file type and server configuration.
Mitigation details are available in related advisories, including the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/8a96d6d5-a5e3-4648-902b-f9d1f8e57e5c?source=cve and the plugin's WordPress.org page at https://wordpress.org/plugins/cpi-wp-migration/.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated arbitrary file upload vulnerability in a public-facing WordPress plugin enables remote code execution, directly mapping to T1190: Exploit Public-Facing Application.