CVE-2025-3623: CWE-502 Deserialization of Untrusted Data in uncannyowl Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin
The Uncanny Automator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.4.0.1 via deserialization of untrusted input in the automator_api_decode_message() function. This makes it possible for unauthenticated to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files.
AI Analysis
Technical Summary
CVE-2025-3623 is a critical vulnerability affecting the Uncanny Automator plugin for WordPress, versions up to and including 6.4.0.1. The vulnerability arises from unsafe deserialization of untrusted data in the function automator_api_decode_message(), which leads to PHP Object Injection (CWE-502). This flaw allows an unauthenticated attacker to inject crafted PHP objects into the plugin's processing flow. The presence of a gadget chain (POP chain) enables the attacker to leverage this injection to perform arbitrary file deletion on the server hosting the WordPress instance. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 9.1 (critical), reflecting the high impact on integrity and availability, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The flaw specifically targets the deserialization mechanism in the plugin's API message decoding, which is a common attack vector in PHP applications when untrusted serialized data is processed without proper validation or sanitization. This vulnerability can lead to significant disruption, including deletion of critical files, potentially causing denial of service or further exploitation through file manipulation. No known exploits are currently reported in the wild, but the severity and ease of exploitation make it a high-priority issue for patching and mitigation.
Potential Impact
For European organizations using WordPress with the Uncanny Automator plugin, this vulnerability poses a severe risk. The ability for unauthenticated attackers to delete arbitrary files can lead to website downtime, loss of critical data, and disruption of business operations. Organizations relying on automated workflows and integrations via this plugin may experience operational failures, impacting customer-facing services and internal processes. The integrity of the website and associated data is compromised, potentially affecting compliance with data protection regulations such as GDPR if personal data is lost or service availability is impacted. Additionally, the attack could be a vector for further compromise if attackers use file deletion to disable security controls or cover tracks. Given WordPress's widespread use across European SMEs and enterprises, the threat surface is significant. The critical severity and network-exploitable nature mean that attackers can target vulnerable sites en masse, increasing the risk of large-scale disruptions.
Mitigation Recommendations
Immediate mitigation should focus on updating the Uncanny Automator plugin to a patched version once available. Until a patch is released, organizations should implement the following specific measures: 1) Restrict access to the WordPress REST API and plugin endpoints by IP whitelisting or firewall rules to limit exposure to untrusted networks. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious serialized payloads or unusual API requests targeting the automator_api_decode_message function. 3) Monitor file system integrity closely for unexpected deletions or modifications, using file integrity monitoring tools tailored for WordPress environments. 4) Disable or limit the use of the Uncanny Automator plugin if feasible, especially on publicly accessible sites, until a secure version is deployed. 5) Review and tighten WordPress user permissions and plugin configurations to minimize attack surface. 6) Conduct regular backups of website files and databases to enable rapid recovery in case of file deletion or other damage. These targeted mitigations go beyond generic advice by focusing on controlling access to vulnerable plugin functionality and enhancing detection of exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-3623: CWE-502 Deserialization of Untrusted Data in uncannyowl Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin
Description
The Uncanny Automator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.4.0.1 via deserialization of untrusted input in the automator_api_decode_message() function. This makes it possible for unauthenticated to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files.
AI-Powered Analysis
Technical Analysis
CVE-2025-3623 is a critical vulnerability affecting the Uncanny Automator plugin for WordPress, versions up to and including 6.4.0.1. The vulnerability arises from unsafe deserialization of untrusted data in the function automator_api_decode_message(), which leads to PHP Object Injection (CWE-502). This flaw allows an unauthenticated attacker to inject crafted PHP objects into the plugin's processing flow. The presence of a gadget chain (POP chain) enables the attacker to leverage this injection to perform arbitrary file deletion on the server hosting the WordPress instance. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 9.1 (critical), reflecting the high impact on integrity and availability, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The flaw specifically targets the deserialization mechanism in the plugin's API message decoding, which is a common attack vector in PHP applications when untrusted serialized data is processed without proper validation or sanitization. This vulnerability can lead to significant disruption, including deletion of critical files, potentially causing denial of service or further exploitation through file manipulation. No known exploits are currently reported in the wild, but the severity and ease of exploitation make it a high-priority issue for patching and mitigation.
Potential Impact
For European organizations using WordPress with the Uncanny Automator plugin, this vulnerability poses a severe risk. The ability for unauthenticated attackers to delete arbitrary files can lead to website downtime, loss of critical data, and disruption of business operations. Organizations relying on automated workflows and integrations via this plugin may experience operational failures, impacting customer-facing services and internal processes. The integrity of the website and associated data is compromised, potentially affecting compliance with data protection regulations such as GDPR if personal data is lost or service availability is impacted. Additionally, the attack could be a vector for further compromise if attackers use file deletion to disable security controls or cover tracks. Given WordPress's widespread use across European SMEs and enterprises, the threat surface is significant. The critical severity and network-exploitable nature mean that attackers can target vulnerable sites en masse, increasing the risk of large-scale disruptions.
Mitigation Recommendations
Immediate mitigation should focus on updating the Uncanny Automator plugin to a patched version once available. Until a patch is released, organizations should implement the following specific measures: 1) Restrict access to the WordPress REST API and plugin endpoints by IP whitelisting or firewall rules to limit exposure to untrusted networks. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious serialized payloads or unusual API requests targeting the automator_api_decode_message function. 3) Monitor file system integrity closely for unexpected deletions or modifications, using file integrity monitoring tools tailored for WordPress environments. 4) Disable or limit the use of the Uncanny Automator plugin if feasible, especially on publicly accessible sites, until a secure version is deployed. 5) Review and tighten WordPress user permissions and plugin configurations to minimize attack surface. 6) Conduct regular backups of website files and databases to enable rapid recovery in case of file deletion or other damage. These targeted mitigations go beyond generic advice by focusing on controlling access to vulnerable plugin functionality and enhancing detection of exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-04-15T01:34:31.565Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fc1484d88663aecb0f
Added to database: 5/20/2025, 6:59:08 PM
Last enriched: 7/6/2025, 4:41:34 PM
Last updated: 1/7/2026, 4:54:17 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.