Home

Description

The Catalog Importer, Scraper & Crawler plugin for WordPress is vulnerable to PHP code injection in all versions up to, and including, 5.1.4. This is due to reliance on a guessable numeric token (e.g. ?key= 900001705) without proper authentication, combined with the unsafe use of eval() on user-supplied input. This makes it possible for unauthenticated attackers to execute arbitrary PHP code on the server via a forged request granted they can guess or brute-force the numeric key.

PUBLISHED Reserved 2025-07-31 | Published 2025-09-11 | Updated 2025-09-11 | Assigner Wordfence




HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-94 Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-09-10:Disclosed

Credits

Alexander Chikaylo finder

References

www.wordfence.com/...-e33c-41db-b9cf-e9d71a0a5588?source=cve

plugins.trac.wordpress.org/...er/tags/5.1.4/megaimporter.php

plugins.trac.wordpress.org/...r/tags/5.1.4/communication.php

plugins.trac.wordpress.org/...r/tags/5.1.4/communication.php

plugins.trac.wordpress.org/...r/tags/5.1.4/communication.php

plugins.trac.wordpress.org/...r/tags/5.1.4/communication.php

cve.org (CVE-2025-8417)

nvd.nist.gov (CVE-2025-8417)

Download JSON