Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0428: CWE-502 Deserialization of Untrusted Data in senols AI Power: Complete AI Pack

0
High
VulnerabilityCVE-2025-0428cvecve-2025-0428cwe-502
Published: Wed Jan 22 2025 (01/22/2025, 07:29:40 UTC)
Source: CVE Database V5
Vendor/Project: senols
Product: AI Power: Complete AI Pack

Description

CVE-2025-0428 is a high-severity PHP Object Injection vulnerability in the WordPress plugin 'AI Power: Complete AI Pack' up to version 1. 8. 96. It arises from unsafe deserialization of untrusted data in the $form['post_content'] variable via the wpaicg_export_prompts function. Exploitation requires an attacker to have administrative privileges on the WordPress site. While the plugin itself lacks a gadget chain (POP chain) for direct code execution, if combined with other vulnerable plugins or themes, it could lead to arbitrary file deletion, data disclosure, or remote code execution. No public exploits are known yet, but the vulnerability poses significant risk due to its impact on confidentiality, integrity, and availability. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent potential chained attacks. The threat primarily affects WordPress sites globally, especially in countries with high WordPress usage and active plugin deployment.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:52:20 UTC

Technical Analysis

CVE-2025-0428 identifies a PHP Object Injection vulnerability classified under CWE-502 in the 'AI Power: Complete AI Pack' WordPress plugin developed by senols. The vulnerability exists in all versions up to and including 1.8.96, specifically in the wpaicg_export_prompts function, which deserializes untrusted input from the $form['post_content'] variable without proper validation or sanitization. This unsafe deserialization allows an authenticated attacker with administrative privileges to inject crafted PHP objects. Although the plugin itself does not contain a gadget chain (POP chain) necessary for immediate exploitation leading to code execution, the presence of other vulnerable plugins or themes on the same WordPress installation could provide such chains. This could enable attackers to perform destructive actions such as deleting arbitrary files, accessing sensitive data, or executing arbitrary code remotely. The vulnerability has a CVSS v3.1 base score of 7.2, reflecting high severity with network attack vector, low attack complexity, and no user interaction required. The vulnerability was published on January 22, 2025, with no known exploits in the wild at the time of reporting. The flaw requires administrative privileges, limiting exploitation to compromised or malicious insiders or attackers who have already gained elevated access. The lack of an official patch link suggests that remediation may require vendor updates or manual mitigation steps. Given the widespread use of WordPress and the popularity of AI-related plugins, this vulnerability represents a significant risk if left unaddressed.

Potential Impact

The impact of CVE-2025-0428 is substantial for organizations running WordPress sites with the affected plugin. Successful exploitation can compromise the confidentiality, integrity, and availability of the affected systems. Attackers with administrative access can inject malicious PHP objects, potentially leading to remote code execution if combined with other vulnerable components, resulting in full system compromise. This can lead to data breaches, website defacement, service disruption, and lateral movement within the network. The requirement for administrative privileges limits the attack surface but also indicates that attackers who have already gained elevated access can escalate their control significantly. The vulnerability could be exploited to delete critical files, exposing organizations to data loss and operational downtime. For organizations relying on AI Power: Complete AI Pack for content generation or AI functionalities, exploitation could disrupt business processes and damage reputation. The absence of known exploits currently provides a window for proactive mitigation, but the risk of chained exploitation remains high.

Mitigation Recommendations

1. Immediately upgrade the 'AI Power: Complete AI Pack' plugin to a patched version once released by the vendor. Monitor vendor communications for updates. 2. Until a patch is available, restrict administrative access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of privilege abuse. 3. Implement strict input validation and sanitization on any user-supplied data, especially for the $form['post_content'] variable, to prevent unsafe deserialization. 4. Conduct a thorough audit of all installed plugins and themes to identify and remove or update any that may provide gadget chains enabling exploitation. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious serialized payloads targeting the vulnerable function. 6. Regularly back up WordPress site data and files to enable recovery in case of compromise or data deletion. 7. Monitor logs for unusual administrative activities or deserialization attempts to detect early exploitation signs. 8. Limit plugin installations to only those necessary and from trusted sources to reduce the attack surface. 9. Educate administrators about the risks of deserialization vulnerabilities and safe plugin management practices. 10. Consider isolating critical WordPress instances or running them in hardened environments to contain potential breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-13T16:54:57.091Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b69b7ef31ef0b555267

Added to database: 2/25/2026, 9:36:41 PM

Last enriched: 2/25/2026, 11:52:20 PM

Last updated: 2/26/2026, 8:04:36 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats