First published: Wed May 14 2025(Updated: )
The Uncanny Automator plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in versions up to, and including, 6.4.0.2. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update plugin settings.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Uncanny Automator | <=6.4.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4520 is considered a medium severity vulnerability due to the potential for unauthorized data modification by authenticated attackers.
To fix CVE-2025-4520, update the Uncanny Automator plugin to version 6.4.0.3 or later.
CVE-2025-4520 affects users of the Uncanny Automator plugin for WordPress versions up to and including 6.4.0.2.
CVE-2025-4520 allows authenticated attackers with subscriber-level permissions to modify data without proper authorization.
Currently, the only recommended action for CVE-2025-4520 is to upgrade the plugin to the latest version, as no official workaround is available.