CVE-2024-7419
WP All Export Pro <= 1.9.1 - Unauthenticated Remote Code Execution via Custom Export Fields
CVSS Score
8.3
EPSS Score
0.0%
EPSS Percentile
0th
The WP ALL Export Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.9.1 via the custom export fields. This is due to the missing input validation and sanitization of user-supplied data. This makes it possible for unauthenticated attackers to inject arbitrary PHP code into form fields that get executed on the server during the export, potentially leading to a complete site compromise. As a prerequisite, the custom export field should include fields containing user-supplied data.
| CWE | CWE-94 |
| Vendor | wp all import |
| Product | wp all export pro |
| Published | Feb 7, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for wp all import wp all export pro
Be the first to know when new high vulnerabilities affecting wp all import wp all export pro are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
WP All Import / WP All Export Pro
0 โค 1.9.1
References
Credits
Francesco Carlucci