CVE-2025-9539: CWE-94 Improper Control of Generation of Code ('Code Injection') in rubengc AutomatorWP – Automator plugin for no-code automations, webhooks & custom integrations in WordPress
The AutomatorWP – Automator plugin for no-code automations, webhooks & custom integrations in WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the automatorwp_ajax_import_automation_from_url function in all versions up to, and including, 5.3.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary automations, which can lead to Remote Code Execution or Privilege escalation once such automation is activated by the administrator
AI Analysis
Technical Summary
CVE-2025-9539 is a high-severity vulnerability affecting the AutomatorWP – Automator plugin for WordPress, which facilitates no-code automations, webhooks, and custom integrations. The vulnerability arises from improper access control in the function automatorwp_ajax_import_automation_from_url, which lacks a proper capability check. This flaw allows authenticated users with as low as Subscriber-level privileges to create arbitrary automation workflows. When an administrator activates such a malicious automation, it can lead to Remote Code Execution (RCE) or privilege escalation, effectively compromising the WordPress environment. The underlying weakness is classified as CWE-94, indicating improper control over code generation, which enables attackers to inject and execute arbitrary code. The CVSS v3.1 base score is 8.0, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring only low privileges and user interaction (administrator activation). No known exploits are currently reported in the wild, but the vulnerability is present in all versions up to and including 5.3.6. Given WordPress’s widespread use and the plugin’s role in automations and integrations, exploitation could allow attackers to pivot within the environment, escalate privileges, and execute arbitrary commands, potentially leading to full site compromise.
Potential Impact
For European organizations relying on WordPress sites with the AutomatorWP plugin, this vulnerability poses a significant risk. Attackers with minimal privileges (Subscriber level) can leverage this flaw to execute arbitrary code, potentially leading to full site takeover, data breaches, defacement, or use of the compromised site as a foothold for further attacks within the network. This is particularly critical for organizations handling sensitive personal data under GDPR, as a breach could lead to regulatory penalties and reputational damage. The ability to escalate privileges and execute code remotely also threatens the integrity and availability of web services, which may disrupt business operations. Given the plugin’s no-code automation features, malicious automations could be crafted to manipulate workflows, exfiltrate data, or introduce persistent backdoors. European entities with public-facing WordPress sites, especially in sectors like e-commerce, education, government, and media, are at heightened risk due to the potential for targeted exploitation and the strategic value of such sites.
Mitigation Recommendations
1. Immediate patching: Organizations should update the AutomatorWP plugin to a version where this vulnerability is fixed once available. Until then, consider disabling the plugin or restricting its usage. 2. Privilege minimization: Limit Subscriber-level accounts and review user roles to ensure only trusted users have access. 3. Monitor and audit: Implement logging and monitoring of automation creation and activation events to detect suspicious activities. 4. Harden administrator workflows: Require multi-factor authentication (MFA) for administrators who activate automations to reduce risk of compromised admin accounts enabling malicious automations. 5. Web application firewall (WAF): Deploy WAF rules to detect and block suspicious requests targeting the vulnerable function, especially those attempting to import automations from URLs. 6. Code review and testing: For organizations developing custom automations, enforce strict validation and sanitization of inputs to prevent code injection. 7. Incident response readiness: Prepare for potential exploitation by having backup and recovery procedures in place and conducting regular security assessments of WordPress environments.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9539: CWE-94 Improper Control of Generation of Code ('Code Injection') in rubengc AutomatorWP – Automator plugin for no-code automations, webhooks & custom integrations in WordPress
Description
The AutomatorWP – Automator plugin for no-code automations, webhooks & custom integrations in WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the automatorwp_ajax_import_automation_from_url function in all versions up to, and including, 5.3.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary automations, which can lead to Remote Code Execution or Privilege escalation once such automation is activated by the administrator
AI-Powered Analysis
Technical Analysis
CVE-2025-9539 is a high-severity vulnerability affecting the AutomatorWP – Automator plugin for WordPress, which facilitates no-code automations, webhooks, and custom integrations. The vulnerability arises from improper access control in the function automatorwp_ajax_import_automation_from_url, which lacks a proper capability check. This flaw allows authenticated users with as low as Subscriber-level privileges to create arbitrary automation workflows. When an administrator activates such a malicious automation, it can lead to Remote Code Execution (RCE) or privilege escalation, effectively compromising the WordPress environment. The underlying weakness is classified as CWE-94, indicating improper control over code generation, which enables attackers to inject and execute arbitrary code. The CVSS v3.1 base score is 8.0, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring only low privileges and user interaction (administrator activation). No known exploits are currently reported in the wild, but the vulnerability is present in all versions up to and including 5.3.6. Given WordPress’s widespread use and the plugin’s role in automations and integrations, exploitation could allow attackers to pivot within the environment, escalate privileges, and execute arbitrary commands, potentially leading to full site compromise.
Potential Impact
For European organizations relying on WordPress sites with the AutomatorWP plugin, this vulnerability poses a significant risk. Attackers with minimal privileges (Subscriber level) can leverage this flaw to execute arbitrary code, potentially leading to full site takeover, data breaches, defacement, or use of the compromised site as a foothold for further attacks within the network. This is particularly critical for organizations handling sensitive personal data under GDPR, as a breach could lead to regulatory penalties and reputational damage. The ability to escalate privileges and execute code remotely also threatens the integrity and availability of web services, which may disrupt business operations. Given the plugin’s no-code automation features, malicious automations could be crafted to manipulate workflows, exfiltrate data, or introduce persistent backdoors. European entities with public-facing WordPress sites, especially in sectors like e-commerce, education, government, and media, are at heightened risk due to the potential for targeted exploitation and the strategic value of such sites.
Mitigation Recommendations
1. Immediate patching: Organizations should update the AutomatorWP plugin to a version where this vulnerability is fixed once available. Until then, consider disabling the plugin or restricting its usage. 2. Privilege minimization: Limit Subscriber-level accounts and review user roles to ensure only trusted users have access. 3. Monitor and audit: Implement logging and monitoring of automation creation and activation events to detect suspicious activities. 4. Harden administrator workflows: Require multi-factor authentication (MFA) for administrators who activate automations to reduce risk of compromised admin accounts enabling malicious automations. 5. Web application firewall (WAF): Deploy WAF rules to detect and block suspicious requests targeting the vulnerable function, especially those attempting to import automations from URLs. 6. Code review and testing: For organizations developing custom automations, enforce strict validation and sanitization of inputs to prevent code injection. 7. Incident response readiness: Prepare for potential exploitation by having backup and recovery procedures in place and conducting regular security assessments of WordPress environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-27T12:25:37.390Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bfcdd7fab242a8024d3084
Added to database: 9/9/2025, 6:48:55 AM
Last enriched: 9/9/2025, 6:49:17 AM
Last updated: 9/9/2025, 9:09:19 AM
Views: 6
Related Threats
CVE-2025-9489: CWE-94 Improper Control of Generation of Code ('Code Injection') in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-43777: CWE-209 Generation of Error Message Containing Sensitive Information in Liferay Portal
MediumCVE-2025-54236: Improper Input Validation (CWE-20) in Adobe Adobe Commerce
CriticalCVE-2025-9994: CWE-306 Missing Authentication for Critical Function in Amped RF BT-AP 111
CriticalCVE-2025-9364: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in Rockwell Automation FactoryTalk® Analytics™ LogixAI®
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.