Cyber Posture

CVE-2025-11170

Critical

Published: 11 November 2025

Published
11 November 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0056 68.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

The WP移行専用プラグイン for CPI plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the Cpiwm_Import_Controller::import function in all versions up to, and including, 1.0.2. This makes it possible for unauthenticated attackers to upload…

more

arbitrary files on the affected site's server which may make remote code execution possible.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces file type and content validation on uploads, addressing the missing validation in the plugin's import function that enables arbitrary file uploads.

prevent

Mandates timely identification, reporting, and correction of the specific flaw in the WP移行専用プラグイン for CPI plugin up to version 1.0.2.

preventdetect

Scans uploaded files for malicious code at entry points, preventing remote code execution from dangerous files uploaded via the vulnerable import function.

Security SummaryAI

CVE-2025-11170 is an arbitrary file upload vulnerability in the WP移行専用プラグイン for CPI plugin for WordPress, affecting all versions up to and including 1.0.2. The flaw arises from missing file type validation in the Cpiwm_Import_Controller::import function, allowing attackers to upload arbitrary files to the affected site's server. It is rated critical with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type). The vulnerability was published on 2025-11-11.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction or privileges required. By leveraging the import function, they can upload malicious files, which may lead to remote code execution on the server depending on the file type and server configuration.

Mitigation details are available in related advisories, including the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/8a96d6d5-a5e3-4648-902b-f9d1f8e57e5c?source=cve and the plugin's WordPress.org page at https://wordpress.org/plugins/cpi-wp-migration/.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated arbitrary file upload vulnerability in a public-facing WordPress plugin enables remote code execution, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References