WordPress Plugin Vulnerabilities
Import any XML, CSV or Excel File to WordPress < 4.0.0 - Admin+ Remote Code Execution via Conditional Logic
Description
The plugin is vulnerable to Remote Code Execution due to the use of eval() on unsanitized user-supplied input in the pmxi_if function within helpers/functions.php. This makes it possible for authenticated attackers, with import capabilities (typically administrators), to inject and execute arbitrary PHP code on the server via crafted import templates. This can lead to remote code execution.
Affects Plugins
References
Classification
Type
RCE
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
tmrswrr
Verified
No
WPVDB ID
Timeline
Publicly Published
2025-11-12 (about 6 months ago)
Added
2025-11-12 (about 6 months ago)
Last Updated
2025-11-12 (about 6 months ago)