Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9334: CWE-94 Improper Control of Generation of Code ('Code Injection') in codesolz Better Find and Replace – AI-Powered Suggestions

0
High
VulnerabilityCVE-2025-9334cvecve-2025-9334cwe-94
Published: Sat Nov 08 2025 (11/08/2025, 05:52:43 UTC)
Source: CVE Database V5
Vendor/Project: codesolz
Product: Better Find and Replace – AI-Powered Suggestions

Description

The Better Find and Replace – AI-Powered Suggestions plugin for WordPress is vulnerable to Limited Code Injection in all versions up to, and including, 1.7.7. This is due to insufficient input validation and restriction on the 'rtafar_ajax' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to call arbitrary plugin functions and execute code within those functions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:52:01 UTC

Technical Analysis

CVE-2025-9334 is a critical code injection vulnerability classified under CWE-94, found in the 'Better Find and Replace – AI-Powered Suggestions' WordPress plugin developed by codesolz. The vulnerability exists in all versions up to and including 1.7.7 due to inadequate input validation and insufficient restrictions on the 'rtafar_ajax' function. This function can be exploited by authenticated users with as low as Subscriber-level privileges to invoke arbitrary plugin functions and execute code within those functions. The attack vector is network-based (AV:N), requires low privileges (PR:L), and no user interaction (UI:N), making it relatively easy to exploit once authenticated. The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H), allowing attackers to potentially take full control of the WordPress site, manipulate data, or disrupt services. Although no known exploits are currently in the wild, the high CVSS score of 8.8 reflects the severity and potential impact. The vulnerability highlights the risks of insufficient input validation in AJAX handlers within WordPress plugins, especially those that expose powerful functionality to authenticated users. The lack of a patch at the time of publication necessitates immediate mitigation efforts by site administrators.

Potential Impact

The impact of CVE-2025-9334 is severe for organizations using the affected plugin. An attacker with minimal authenticated access (Subscriber or higher) can execute arbitrary code, potentially leading to full site compromise. This includes unauthorized data access or modification, defacement, deployment of malware or backdoors, and disruption of website availability. For businesses relying on WordPress for their online presence, this can result in data breaches, loss of customer trust, regulatory penalties, and operational downtime. The vulnerability's ease of exploitation and broad scope (all plugin versions) increase the risk of widespread attacks once exploit code becomes available. Additionally, compromised WordPress sites can be leveraged as pivot points for further attacks within an organization's network or for launching attacks against third parties. The threat is particularly critical for high-traffic websites, e-commerce platforms, and organizations handling sensitive user data.

Mitigation Recommendations

1. Immediately restrict user roles and permissions to the minimum necessary, especially limiting Subscriber-level users from accessing sensitive plugin functionality. 2. Monitor and log AJAX requests to the 'rtafar_ajax' endpoint for unusual or unauthorized activity. 3. Disable or uninstall the 'Better Find and Replace – AI-Powered Suggestions' plugin until a security patch is released by the vendor. 4. If disabling the plugin is not feasible, implement web application firewall (WAF) rules to block suspicious requests targeting the vulnerable function. 5. Regularly update WordPress core and all plugins to their latest versions once a patch addressing this vulnerability is available. 6. Conduct a thorough security audit of WordPress installations to detect any signs of compromise related to this vulnerability. 7. Educate site administrators and users about the risks of granting unnecessary privileges and the importance of strong authentication controls. 8. Consider deploying additional security plugins that provide enhanced input validation and intrusion detection capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-08-21T23:29:44.529Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690edcb42137a290ee0198e6

Added to database: 11/8/2025, 6:01:24 AM

Last enriched: 2/26/2026, 5:52:01 PM

Last updated: 3/26/2026, 11:12:48 AM

Views: 166

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses