{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T10:25:36.884","vulnerabilities":[{"cve":{"id":"CVE-2025-3623","sourceIdentifier":"security@wordfence.com","published":"2025-05-14T03:15:33.073","lastModified":"2025-08-12T01:51:52.263","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Uncanny Automator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.4.0.1 via deserialization of untrusted input in the automator_api_decode_message() function. This makes it possible for unauthenticated to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files."},{"lang":"es","value":"El complemento Uncanny Automator para WordPress es vulnerable a la inyección de objetos PHP en todas las versiones hasta la 6.4.0.1 incluida, mediante la deserialización de entradas no confiables en la función automator_api_decode_message(). Esto permite a atacantes autenticados, con acceso de suscriptor o superior, inyectar un objeto PHP. La presencia adicional de una cadena POP permite a los atacantes eliminar archivos arbitrarios."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.2}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-502"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:uncannyowl:uncanny_automator:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"6.4.0.2","matchCriteriaId":"0A476B4A-5B38-4BE9-87A1-E712996324D5"}]}]}],"references":[{"url":"https://automatorplugin.com/knowledge-base/uncanny-automator-changelog/#6-4-0-2-2025-04-18","source":"security@wordfence.com","tags":["Release Notes"]},{"url":"https://plugins.trac.wordpress.org/browser/uncanny-automator/trunk/src/core/lib/helpers/class-automator-recipe-helpers.php#L540","source":"security@wordfence.com","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/changeset/3276577/uncanny-automator/trunk/src/core/lib/helpers/class-automator-recipe-helpers.php","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://wordpress.org/plugins/uncanny-automator/#developers","source":"security@wordfence.com","tags":["Release Notes"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/00bcfd8f-9785-449a-a0ea-16e2583d684a?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}