CVE-2025-9334: CWE-94 Improper Control of Generation of Code ('Code Injection') in codesolz Better Find and Replace – AI-Powered Suggestions
The Better Find and Replace – AI-Powered Suggestions plugin for WordPress is vulnerable to Limited Code Injection in all versions up to, and including, 1.7.7. This is due to insufficient input validation and restriction on the 'rtafar_ajax' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to call arbitrary plugin functions and execute code within those functions.
AI Analysis
Technical Summary
CVE-2025-9334 is a critical code injection vulnerability classified under CWE-94, found in the 'Better Find and Replace – AI-Powered Suggestions' WordPress plugin developed by codesolz. The vulnerability exists in all versions up to and including 1.7.7 due to inadequate input validation and insufficient restrictions on the 'rtafar_ajax' function. This function can be exploited by authenticated users with as low as Subscriber-level privileges to invoke arbitrary plugin functions and execute code within those functions. The attack vector is network-based (AV:N), requires low privileges (PR:L), and no user interaction (UI:N), making it relatively easy to exploit once authenticated. The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H), allowing attackers to potentially take full control of the WordPress site, manipulate data, or disrupt services. Although no known exploits are currently in the wild, the high CVSS score of 8.8 reflects the severity and potential impact. The vulnerability highlights the risks of insufficient input validation in AJAX handlers within WordPress plugins, especially those that expose powerful functionality to authenticated users. The lack of a patch at the time of publication necessitates immediate mitigation efforts by site administrators.
Potential Impact
The impact of CVE-2025-9334 is severe for organizations using the affected plugin. An attacker with minimal authenticated access (Subscriber or higher) can execute arbitrary code, potentially leading to full site compromise. This includes unauthorized data access or modification, defacement, deployment of malware or backdoors, and disruption of website availability. For businesses relying on WordPress for their online presence, this can result in data breaches, loss of customer trust, regulatory penalties, and operational downtime. The vulnerability's ease of exploitation and broad scope (all plugin versions) increase the risk of widespread attacks once exploit code becomes available. Additionally, compromised WordPress sites can be leveraged as pivot points for further attacks within an organization's network or for launching attacks against third parties. The threat is particularly critical for high-traffic websites, e-commerce platforms, and organizations handling sensitive user data.
Mitigation Recommendations
1. Immediately restrict user roles and permissions to the minimum necessary, especially limiting Subscriber-level users from accessing sensitive plugin functionality. 2. Monitor and log AJAX requests to the 'rtafar_ajax' endpoint for unusual or unauthorized activity. 3. Disable or uninstall the 'Better Find and Replace – AI-Powered Suggestions' plugin until a security patch is released by the vendor. 4. If disabling the plugin is not feasible, implement web application firewall (WAF) rules to block suspicious requests targeting the vulnerable function. 5. Regularly update WordPress core and all plugins to their latest versions once a patch addressing this vulnerability is available. 6. Conduct a thorough security audit of WordPress installations to detect any signs of compromise related to this vulnerability. 7. Educate site administrators and users about the risks of granting unnecessary privileges and the importance of strong authentication controls. 8. Consider deploying additional security plugins that provide enhanced input validation and intrusion detection capabilities.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2025-9334: CWE-94 Improper Control of Generation of Code ('Code Injection') in codesolz Better Find and Replace – AI-Powered Suggestions
Description
The Better Find and Replace – AI-Powered Suggestions plugin for WordPress is vulnerable to Limited Code Injection in all versions up to, and including, 1.7.7. This is due to insufficient input validation and restriction on the 'rtafar_ajax' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to call arbitrary plugin functions and execute code within those functions.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-9334 is a critical code injection vulnerability classified under CWE-94, found in the 'Better Find and Replace – AI-Powered Suggestions' WordPress plugin developed by codesolz. The vulnerability exists in all versions up to and including 1.7.7 due to inadequate input validation and insufficient restrictions on the 'rtafar_ajax' function. This function can be exploited by authenticated users with as low as Subscriber-level privileges to invoke arbitrary plugin functions and execute code within those functions. The attack vector is network-based (AV:N), requires low privileges (PR:L), and no user interaction (UI:N), making it relatively easy to exploit once authenticated. The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H), allowing attackers to potentially take full control of the WordPress site, manipulate data, or disrupt services. Although no known exploits are currently in the wild, the high CVSS score of 8.8 reflects the severity and potential impact. The vulnerability highlights the risks of insufficient input validation in AJAX handlers within WordPress plugins, especially those that expose powerful functionality to authenticated users. The lack of a patch at the time of publication necessitates immediate mitigation efforts by site administrators.
Potential Impact
The impact of CVE-2025-9334 is severe for organizations using the affected plugin. An attacker with minimal authenticated access (Subscriber or higher) can execute arbitrary code, potentially leading to full site compromise. This includes unauthorized data access or modification, defacement, deployment of malware or backdoors, and disruption of website availability. For businesses relying on WordPress for their online presence, this can result in data breaches, loss of customer trust, regulatory penalties, and operational downtime. The vulnerability's ease of exploitation and broad scope (all plugin versions) increase the risk of widespread attacks once exploit code becomes available. Additionally, compromised WordPress sites can be leveraged as pivot points for further attacks within an organization's network or for launching attacks against third parties. The threat is particularly critical for high-traffic websites, e-commerce platforms, and organizations handling sensitive user data.
Mitigation Recommendations
1. Immediately restrict user roles and permissions to the minimum necessary, especially limiting Subscriber-level users from accessing sensitive plugin functionality. 2. Monitor and log AJAX requests to the 'rtafar_ajax' endpoint for unusual or unauthorized activity. 3. Disable or uninstall the 'Better Find and Replace – AI-Powered Suggestions' plugin until a security patch is released by the vendor. 4. If disabling the plugin is not feasible, implement web application firewall (WAF) rules to block suspicious requests targeting the vulnerable function. 5. Regularly update WordPress core and all plugins to their latest versions once a patch addressing this vulnerability is available. 6. Conduct a thorough security audit of WordPress installations to detect any signs of compromise related to this vulnerability. 7. Educate site administrators and users about the risks of granting unnecessary privileges and the importance of strong authentication controls. 8. Consider deploying additional security plugins that provide enhanced input validation and intrusion detection capabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-21T23:29:44.529Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690edcb42137a290ee0198e6
Added to database: 11/8/2025, 6:01:24 AM
Last enriched: 2/26/2026, 5:52:01 PM
Last updated: 3/21/2026, 9:23:01 PM
Views: 165
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.