Import any XML or CSV File to WordPress Vulnerability – Cross-Site Request Forgery to Notice Dismissal – CVE-2024-31939 | WordPress Plugin Vulnerability Report

Plugin Name: Import any XML or CSV File to WordPress

Key Information:

  • Software Type: Plugin
  • Software Slug: wp-all-import
  • Software Status: Active
  • Software Author: wpallimport
  • Software Downloads: 3,920,346
  • Active Installs: 100,000
  • Last Updated: April 24, 2024
  • Patched Versions: 3.7.4
  • Affected Versions: <= 3.7.3

Vulnerability Details:

  • Name: Import any XML or CSV File to WordPress <= 3.7.3
  • Type: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
  • CVE: CVE-2024-31939
  • CVSS Score: 4.3
  • Publicly Published: April 10, 2024
  • Researcher: Dhabaleshwar Das
  • Description: The Import any XML or CSV File to WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.7.3. This vulnerability arises from missing or incorrect nonce validation on several functions, enabling unauthenticated attackers to dismiss notices via a forged request provided they can trick a site administrator into performing an action such as clicking on a link.


The Import any XML or CSV File to WordPress plugin has a vulnerability in versions up to and including 3.7.3 that allows for Cross-Site Request Forgery due to inadequate nonce validation. This vulnerability has been patched in version 3.7.4.

Detailed Overview:

This vulnerability in the Import any XML or CSV File to WordPress plugin exposes sites to CSRF attacks where attackers could manipulate notice dismissals among other potential administrative actions, by exploiting the trust between the browser and the site. Such attacks could lead to unauthorized changes that might not be immediately noticeable but could compromise site management or data integrity. The necessary update to version 3.7.4 corrects the nonce validation issues, thus mitigating the risk associated with this vulnerability.

Advice for Users:

  • Immediate Action: Users should update to the patched version, 3.7.4, immediately to secure their installations.
  • Check for Signs of Vulnerability: Administrators should inspect their site’s activity logs for any unusual administrative actions that could indicate CSRF exploitation.
  • Alternate Plugins: While the current issue has been addressed, users may consider evaluating other data import plugins that consistently demonstrate robust security practices as a precaution.
  • Stay Updated: It is crucial to regularly update all software components on your website to prevent vulnerabilities and ensure optimal functionality and security.


The prompt response by the developers of the Import any XML or CSV File to WordPress plugin to patch this CSRF vulnerability highlights the importance of timely software updates. Users are advised to ensure that they are running version 3.7.4 or later to maintain the security of their WordPress installations. Staying vigilant and proactive in updating software is key to protecting digital assets from potential threats.


Detailed Report: 

In today’s digital landscape, the security of a website is paramount, not just for the integrity of the site, but for the protection of sensitive user data it may hold. WordPress, powering over 40% of all websites, is often at the forefront of this battle against digital threats. A stark reminder of the ongoing necessity to maintain vigilance came with the discovery of a significant vulnerability in the widely used "Import any XML or CSV File to WordPress" plugin. This plugin, essential for many users for data import tasks, was found to be susceptible to Cross-Site Request Forgery (CSRF), a vulnerability that could potentially compromise the administrative functions of countless websites.

About the Plugin: Import any XML or CSV File to WordPress

"Import any XML or CSV File to WordPress" is a popular plugin developed by wpallimport, facilitating the seamless import of data into WordPress sites. It has been downloaded nearly 4 million times and is actively installed on 100,000 WordPress sites. Regularly updated by its developers, the plugin was last patched in April 2024, reflecting an active effort to secure its functionality.

Vulnerability Details

Identified by CVE-2024-31939, this CSRF vulnerability affects versions up to and including 3.7.3 of the plugin. The flaw results from insufficient nonce validation in its functions, allowing unauthenticated attackers to potentially toggle settings without the site administrator’s consent. With a CVSS score of 4.3, it poses a moderate security risk that was publicly disclosed by researcher Dhabaleshwar Das in April 2024.

Risks and Potential Impacts

The vulnerability exposes sites to CSRF attacks where attackers could manipulate administrative actions, such as dismissing notices. This might not immediately appear drastic but could lead to overlooked critical warnings or unauthorized changes in plugin settings, affecting site functionality and data integrity. Such vulnerabilities underline the critical importance of securing administrative interfaces and validating all user-submitted data.

Remediation Steps

Upon discovery, the plugin developers promptly issued a patched version, 3.7.4, to address this security flaw. Site administrators are urged to update their plugin installations immediately to this latest version to mitigate the risk. Additional recommended steps include:

  • Regularly checking site and plugin activity logs for any signs of unauthorized actions that could suggest an exploit.
  • Setting up automatic updates for plugins to ensure that security patches are applied as soon as they are released.

Overview of Previous Vulnerabilities

Since its release, the "Import any XML or CSV File to WordPress" plugin has encountered 17 vulnerabilities, with patches promptly provided for each. This history not only emphasizes the plugin's exposure to security issues but also the developer's commitment to resolving such issues swiftly.


The rapid response to patch the identified CSRF vulnerability in the "Import any XML or CSV File to WordPress" plugin highlights the necessity of staying proactive with updates as a critical component of website security. For small business owners managing WordPress sites, this incident serves as a potent reminder of the risks associated with neglecting software maintenance. Regular updates, vigilant security practices, and an awareness of the plugins' security histories are essential strategies to safeguard digital assets effectively. Keeping your software up to date is not just a technical task—it is a fundamental business responsibility that protects your site, your data, and your customers.

This structured article aims to educate WordPress users, particularly small business owners, about the importance of software security and the steps needed to protect their sites from potential vulnerabilities.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.


Import any XML or CSV File to WordPress Vulnerability – Cross-Site Request Forgery to Notice Dismissal – CVE-2024-31939 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment