Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0429: CWE-502 Deserialization of Untrusted Data in senols AI Power: Complete AI Pack

0
High
VulnerabilityCVE-2025-0429cvecve-2025-0429cwe-502
Published: Wed Jan 22 2025 (01/22/2025, 07:29:40 UTC)
Source: CVE Database V5
Vendor/Project: senols
Product: AI Power: Complete AI Pack

Description

CVE-2025-0429 is a high-severity vulnerability in the WordPress plugin 'AI Power: Complete AI Pack' that allows PHP Object Injection via deserialization of untrusted data. The flaw exists in versions up to 1. 8. 96 within the wpaicg_export_ai_forms() function, where the $form['post_content'] variable is deserialized without proper validation. Exploitation requires an attacker to have authenticated administrative privileges. While no gadget (POP) chain is included in the plugin itself, the presence of additional plugins or themes with exploitable POP chains could enable remote code execution, arbitrary file deletion, or data disclosure. The vulnerability has a CVSS score of 7. 2, reflecting high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this vulnerability to prevent potential severe compromise.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:52:40 UTC

Technical Analysis

The vulnerability identified as CVE-2025-0429 affects the 'AI Power: Complete AI Pack' WordPress plugin developed by senols. It is a PHP Object Injection vulnerability stemming from unsafe deserialization of untrusted input in the wpaicg_export_ai_forms() function, specifically via the $form['post_content'] variable. Deserialization of untrusted data (CWE-502) can allow attackers to manipulate application logic by injecting crafted serialized PHP objects. In this case, the attacker must be authenticated with administrative privileges to exploit the flaw, which limits the attack surface but still poses a significant risk. The plugin does not include a POP (Property Oriented Programming) gadget chain internally, which is typically required to achieve code execution. However, if other plugins or themes installed on the same WordPress instance contain suitable POP chains, an attacker could leverage this vulnerability to execute arbitrary code, delete files, or access sensitive information. The vulnerability is present in all versions up to and including 1.8.96. The CVSS 3.1 score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) indicates network exploitable with low complexity but requiring high privileges and no user interaction, impacting confidentiality, integrity, and availability. No patches or exploit code are currently publicly available, but the risk remains high due to the potential impact and the widespread use of WordPress plugins.

Potential Impact

If exploited, this vulnerability could lead to severe consequences for affected organizations. An attacker with administrative access could inject malicious PHP objects, potentially leading to remote code execution if a suitable POP chain exists in the environment. This could result in full system compromise, including unauthorized data access, data modification, or deletion of critical files. The integrity and availability of the WordPress site and underlying server could be severely impacted, potentially causing service outages or data breaches. Given the plugin's AI-related functionality, sensitive AI-generated content or configurations could also be exposed or manipulated. Organizations relying on this plugin for AI capabilities in WordPress are at risk of targeted attacks, especially if they have additional plugins or themes that provide exploitable POP chains. The requirement for administrative privileges reduces the risk from external unauthenticated attackers but does not eliminate the threat from insider threats or compromised admin accounts.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the 'AI Power: Complete AI Pack' plugin once a patch is released by the vendor. Until a patch is available, administrators should restrict access to trusted users only and review administrative account security, including enforcing strong authentication and monitoring for suspicious activity. Disable or remove unnecessary plugins and themes that could provide POP chains to reduce the attack surface. Implement Web Application Firewalls (WAFs) with rules to detect and block suspicious serialized PHP payloads targeting the vulnerable function. Conduct regular security audits and code reviews of installed plugins and themes to identify potential gadget chains. Additionally, consider isolating WordPress instances or running them with least privilege to limit the impact of a successful exploit. Backup WordPress sites and databases regularly to enable recovery in case of compromise. Finally, educate administrators about the risks of deserialization vulnerabilities and the importance of cautious plugin management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-13T16:56:10.632Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b69b7ef31ef0b55526b

Added to database: 2/25/2026, 9:36:41 PM

Last enriched: 2/25/2026, 11:52:40 PM

Last updated: 2/26/2026, 9:23:33 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats