Uncanny Automator

4 CVEs product

Monthly

CVE-2025-4520 MEDIUM This Month

The Uncanny Automator plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in versions up to, and including, 6.4.0.2. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

WordPress Authentication Bypass Uncanny Automator PHP
NVD
CVSS 3.1
5.4
EPSS
0.2%
CVE-2025-3623 CRITICAL PATCH Act Now

The Uncanny Automator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.4.0.1 via deserialization of untrusted input in the. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Deserialization of Untrusted Data vulnerability could allow attackers to execute arbitrary code through malicious serialized objects.

WordPress PHP Deserialization Uncanny Automator
NVD
CVSS 3.1
9.1
EPSS
1.1%
CVE-2025-2075 HIGH PATCH Act Now

The Uncanny Automator - Easy Automation, Integration, Webhooks & Workflow Builder Plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3.0.2. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. Epss exploitation probability 25.0%.

WordPress Authentication Bypass Privilege Escalation Uncanny Automator PHP
NVD
CVSS 3.1
8.8
EPSS
25.0%
CVE-2024-13838 MEDIUM PATCH This Month

The Uncanny Automator - Easy Automation, Integration, Webhooks & Workflow Builder Plugin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.2. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity. This Server-Side Request Forgery (SSRF) vulnerability could allow attackers to make the server perform requests to unintended internal or external resources.

WordPress SSRF Uncanny Automator
NVD
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-4520
EPSS 0% CVSS 5.4
MEDIUM This Month

The Uncanny Automator plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in versions up to, and including, 6.4.0.2. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

WordPress Authentication Bypass Uncanny Automator +1
NVD
CVE-2025-3623
EPSS 1% CVSS 9.1
CRITICAL PATCH Act Now

The Uncanny Automator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.4.0.1 via deserialization of untrusted input in the. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Deserialization of Untrusted Data vulnerability could allow attackers to execute arbitrary code through malicious serialized objects.

WordPress PHP Deserialization +1
NVD
CVE-2025-2075
EPSS 25% CVSS 8.8
HIGH PATCH Act Now

The Uncanny Automator - Easy Automation, Integration, Webhooks & Workflow Builder Plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3.0.2. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. Epss exploitation probability 25.0%.

WordPress Authentication Bypass Privilege Escalation +2
NVD
CVE-2024-13838
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Uncanny Automator - Easy Automation, Integration, Webhooks & Workflow Builder Plugin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.2. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity. This Server-Side Request Forgery (SSRF) vulnerability could allow attackers to make the server perform requests to unintended internal or external resources.

WordPress SSRF Uncanny Automator
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy