CVE-2025-3623

The Uncanny Automator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.4.0.1 via deserialization of untrusted input in the automator_api_decode_message() function. This makes it possible for unauthenticated to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files.
Configurations

Configuration 1 (hide)

cpe:2.3:a:uncannyowl:uncanny_automator:*:*:*:*:*:wordpress:*:*

History

12 Aug 2025, 01:51

Type Values Removed Values Added
CPE cpe:2.3:a:uncannyowl:uncanny_automator:*:*:*:*:*:wordpress:*:*
References () https://automatorplugin.com/knowledge-base/uncanny-automator-changelog/#6-4-0-2-2025-04-18 - () https://automatorplugin.com/knowledge-base/uncanny-automator-changelog/#6-4-0-2-2025-04-18 - Release Notes
References () https://plugins.trac.wordpress.org/browser/uncanny-automator/trunk/src/core/lib/helpers/class-automator-recipe-helpers.php#L540 - () https://plugins.trac.wordpress.org/browser/uncanny-automator/trunk/src/core/lib/helpers/class-automator-recipe-helpers.php#L540 - Product
References () https://plugins.trac.wordpress.org/changeset/3276577/uncanny-automator/trunk/src/core/lib/helpers/class-automator-recipe-helpers.php - () https://plugins.trac.wordpress.org/changeset/3276577/uncanny-automator/trunk/src/core/lib/helpers/class-automator-recipe-helpers.php - Patch
References () https://wordpress.org/plugins/uncanny-automator/#developers - () https://wordpress.org/plugins/uncanny-automator/#developers - Release Notes
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/00bcfd8f-9785-449a-a0ea-16e2583d684a?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/00bcfd8f-9785-449a-a0ea-16e2583d684a?source=cve - Third Party Advisory
First Time Uncannyowl uncanny Automator
Uncannyowl

13 Jun 2025, 14:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.1
v2 : unknown
v3 : 9.1
Summary (en) The Uncanny Automator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.4.0.1 via deserialization of untrusted input in the automator_api_decode_message() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files. (en) The Uncanny Automator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.4.0.1 via deserialization of untrusted input in the automator_api_decode_message() function. This makes it possible for unauthenticated to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files.

16 May 2025, 14:43

Type Values Removed Values Added
Summary
  • (es) El complemento Uncanny Automator para WordPress es vulnerable a la inyección de objetos PHP en todas las versiones hasta la 6.4.0.1 incluida, mediante la deserialización de entradas no confiables en la función automator_api_decode_message(). Esto permite a atacantes autenticados, con acceso de suscriptor o superior, inyectar un objeto PHP. La presencia adicional de una cadena POP permite a los atacantes eliminar archivos arbitrarios.

14 May 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-14 03:15

Updated : 2025-08-12 01:51


NVD link : CVE-2025-3623

Mitre link : CVE-2025-3623

CVE.ORG link : CVE-2025-3623


JSON object : View

Products Affected

uncannyowl

  • uncanny_automator
CWE
CWE-502

Deserialization of Untrusted Data