Vulnerability Description
The WP Import – Ultimate CSV XML Importer for WordPress plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 7.37. This is due to insufficient escaping on the `file_name` parameter which is stored in the database during file upload and later used in raw SQL queries without proper sanitization. This makes it possible for authenticated attackers with Subscriber-level access or higher to append additional SQL queries into already existing queries via a malicious filename, which can be used to extract sensitive information from the database. The vulnerability can only be exploited when the 'Single Import/Export' option is enabled, and the server is running a PHP version < 8.0.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/wp-ultimate-csv-importer/tags/7.34/ma
- https://plugins.trac.wordpress.org/browser/wp-ultimate-csv-importer/tags/7.34/up
- https://plugins.trac.wordpress.org/changeset/3445414
- https://www.wordfence.com/threat-intel/vulnerabilities/id/fd80133d-03c7-4ecb-ad2
FAQ
What is CVE-2026-1317?
CVE-2026-1317 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The WP Import – Ultimate CSV XML Importer for WordPress plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 7.37. This is due to insufficient escaping on the `fil...
How severe is CVE-2026-1317?
CVE-2026-1317 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-1317?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.