Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total5
Critical1
High1
Medium3
Reset
Showing 1-5 of 5 records
Threat Entry Updated 2026-01-26

CVE-2025-15522 - Uncanny Automator Plugin

The Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the automator_discord_user_mapping shortcode in all versions up to, and including, 6.10.0.2 due to insufficient input sanitization and output escaping on the verified_message parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user with a verified Discord account accesses the injected page.

PLUGIN Uncanny Automator

CVE-2025-15522

MEDIUM CVSS 6.4 2026-01-23
Threat Entry Updated 2025-08-12

CVE-2025-3623 - Uncanny Automator Plugin

The Uncanny Automator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.4.0.1 via deserialization of untrusted input in the automator_api_decode_message() function. This makes it possible for unauthenticated to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files.

PLUGIN Uncanny Automator

CVE-2025-3623

CRITICAL CVSS 9.1 2025-05-14
Threat Entry Updated 2025-08-12

CVE-2025-4520 - Uncanny Automator Plugin

The Uncanny Automator plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in versions up to, and including, 6.4.0.2. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update plugin settings.

PLUGIN Uncanny Automator

CVE-2025-4520

MEDIUM CVSS 5.4 2025-05-14
Threat Entry Updated 2025-08-08

CVE-2025-2075 - Uncanny Automator Plugin

The Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3.0.2. This is due to add_role() and user_role() functions missing proper capability checks performed through the validate_rest_call() function. This makes it possible for unauthenticated attackers to set the role of arbitrary users to administrator granting full access to the site, though privilege escalation requires an active account on the site so this is considered an authenticated privilege escalation.

PLUGIN Uncanny Automator

CVE-2025-2075

HIGH CVSS 8.8 2025-04-04
Threat Entry Updated 2025-04-02

CVE-2024-13838 - Uncanny Automator Plugin

The Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.2 via the 'call_webhook' method of the Automator_Send_Webhook class This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

PLUGIN Uncanny Automator

CVE-2024-13838

MEDIUM CVSS 5.5 2025-03-12
Scroll to top