PHP Object Injection in Uncanny Automator Plugin for WordPress
CVE-2025-3623

9.1CRITICAL

What is CVE-2025-3623?

The Uncanny Automator plugin for WordPress is susceptible to PHP Object Injection due to the unsafe deserialization of untrusted input in the automator_api_decode_message() function. This vulnerability affects all versions up to and including 6.4.0.1, allowing authenticated users with at least Subscriber-level access to exploit the issue. By leveraging a crafted input, attackers can inject arbitrary PHP objects into the application, which can lead to severe consequences, including the deletion of arbitrary files through the presence of a PHP Object Injection Payload (POP) chain.

Affected Version(s)

Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin * <= 6.4.0.1

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.