The Uncanny Automator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.4.0.1 via deserialization of untrusted input in the automator_api_decode_message() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files.
CVE ID: CVE-2025-3623
CVSS Base Severity: HIGH
CVSS Base Score: 8.1
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Vendor: uncannyowl
Product: Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin
EPSS Score: 0.06% (probability of being exploited)
EPSS Percentile: 19.33% (scored less or equal to compared to others)
EPSS Date: 2025-06-12 (when was this score calculated)
SSVC Exploitation: none
SSVC Technical Impact: total
SSVC Automatable: false