On October 11, 2025, a medium-severity vulnerability, CVE-2025-11254, was disclosed in the 'Contest Gallery' WordPress plugin. The flaw is a CSV Injection vulnerability that allows an unauthenticated attacker to inject malicious formulas into data fields. When a privileged user, such as a site administrator, exports this data as a CSV file and opens it in a spreadsheet application, the embedded formula can execute commands on the administrator's computer. This can lead to local code execution. The vulnerability has a CVSS 3.1 score of 4.3 and affects all plugin versions up to 27.0.3. A patch is available in version 28.0.0, and users are advised to update.
CVE-2025-11254CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NCWE-1236: Improper Neutralization of Formula Elements in a CSV File=cmd|' /C calc'!A1) to a form field managed by the Contest Gallery plugin. This data is stored in the database. Later, a site administrator exports the contest entries as a CSV file. When the administrator opens this CSV file with a program like Microsoft Excel or LibreOffice Calc, the application interprets the string as a formula and executes it.This type of vulnerability requires user interaction (the victim must download and open the file), making it less likely to be exploited at mass scale compared to a remote, unauthenticated RCE. However, it is a classic and effective social engineering attack vector against site administrators.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| command_line_pattern | ^=, ^@, ^+, ^- |
Strings in user-submitted form data that begin with characters that spreadsheet programs interpret as formulas. | Database inspection, application-level firewall rules. | high |
| log_source | WordPress database |
The malicious formulas will be stored in the database tables associated with the Contest Gallery plugin. | Manual database audit or automated scanning. | medium |
=cmd|, =HYPERLINK) in fields populated by the Contest Gallery plugin.M1051 - Update Software): The vulnerability has been patched in version 28.0.0 of the Contest Gallery plugin. Users should update to this version or later immediately.M1017 - User Training): Train administrators on the dangers of CSV injection. Advise them to be cautious when opening exported CSV files and to disable automatic formula execution in their spreadsheet software if possible. Many modern spreadsheet applications now display a warning before executing formulas from a CSV file, and users should be trained to heed these warnings.Update the Contest Gallery plugin to the patched version 28.0.0 or later.
Mapped D3FEND Techniques:
Train administrators to be aware of the risks of opening CSV files from untrusted sources and to heed security warnings from spreadsheet applications.
Configure spreadsheet software to disable automatic execution of formulas from CSV files where possible.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats