CVE-2025-12732
MEDIUMAny WordPress site running WP Import plugin with an OpenAI API key configured is leaking that key to any authenticated user with Author-level access or above — no exploit sophistication required. Rotate your OpenAI API keys immediately, set spending limits in your OpenAI dashboard, and update or disable the plugin. Audit your WordPress user roster for unnecessary Author+ accounts.
Severity & Risk
Recommended Action
- 1. Immediately revoke and reissue any OpenAI API keys configured in WP Import plugin — assume compromise if you cannot confirm no unauthorized Author+ access. 2. Update WP Import to a patched version above 7.33. 3. Set hard spending limits and usage alerts on your OpenAI account as a blast-radius control. 4. Review OpenAI API usage logs for anomalous call volumes or unexpected model usage. 5. Audit WordPress user accounts — remove or downgrade unnecessary Author+ roles. 6. Scope API keys to minimum required permissions and consider per-environment key rotation. 7. Detection: alert on OpenAI API calls from unexpected IP ranges or at unusual hours.
Classification
Compliance Impact
This CVE is relevant to:
Technical Details
NVD Description
The WP Import – Ultimate CSV XML Importer for WordPress plugin for WordPress is vulnerable to unauthorized access of sensitive information due to a missing authorization check on the showsetting() function in all versions up to, and including, 7.33. This makes it possible for authenticated attackers, with Author-level access or higher, to extract sensitive information including OpenAI API keys configured through the plugin's admin interface.
Exploitation Scenario
An attacker registers a free account on a WordPress site (or compromises an existing low-privilege contributor account). They craft a direct HTTP request to the vulnerable showsetting() endpoint — no special tooling required, just an authenticated session cookie. The endpoint returns admin plugin configuration including the plaintext OpenAI API key. The attacker then uses this key externally to run GPT-4 or DALL-E queries at the victim's expense, or resells the key on underground markets. A financially motivated adversary could systematically scan WordPress sites running this plugin, extract keys at scale, and run a cost-harvesting operation before the victim notices unusual billing.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N References
- plugins.trac.wordpress.org/browser/wp-ultimate-csv-importer/trunk/controllers/SendPassword.php
- plugins.trac.wordpress.org/browser/wp-ultimate-csv-importer/trunk/controllers/SendPassword.php
- plugins.trac.wordpress.org/changeset/3390161/wp-ultimate-csv-importer/trunk/controllers/SendPassword.php
- wordfence.com/threat-intel/vulnerabilities/id/25687ee6-a899-4089-966b-69578afd3fb6