cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches foruncanny-automator uncanny-automator

Direction: ascending
Jun 07, 2024

Uncanny Automator – Automate everything with the #1 automation, integration & webhooks plugin # e060b6e6560d3deb2199fbf637f94070cdbca4af

Date
May 25, 2023
Research Description
Uncanny Automator &#8211; Easy Automation, Integration, Webhooks &amp; Workflow Builder Plugin [uncanny-automator] < 4.15 WordPress Uncanny Automator Plugin < 4.15 is vulnerable to Cross Site Request Forgery (CSRF) Update the WordPress Uncanny Automator plugin to the latest available version (at least 4.15). WordFence discovered and reported this Cross Site Request Forgery (CSRF) vulnerability in WordPress Uncanny Automator Plugin. This could allow a malicious actor to force higher privileged users to execute unwanted actions under their current authentication. This vulnerability has been fixed in version 4.15.
Affected versions
Min -, max -.
Status
vulnerable

Uncanny Automator – Automate everything with the #1 automation, integration &amp; webhooks plugin # CVE-2023-52151

CVE, Research URL

CVE-2023-52151

Date
Jan 05, 2024
Research Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Uncanny Automator, Uncanny Owl Uncanny Automator – Automate everything with the #1 no-code automation and integration plugin.This issue affects Uncanny Automator – Automate everything with the #1 no-code automation and integration plugin: from n/a through 5.1.0.2.
Affected versions
Min -, max -.
Status
vulnerable
Mar 13, 2025

Uncanny Automator – Automate everything with the #1 automation, integration &amp; webhooks plugin # CVE-2024-13838

CVE, Research URL

CVE-2024-13838

Date
Mar 12, 2025
Research Description
The Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.2 via the 'call_webhook' method of the Automator_Send_Webhook class This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Affected versions
Min -, max -.
Status
vulnerable
Apr 05, 2025

Uncanny Automator – Automate everything with the #1 automation, integration &amp; webhooks plugin # CVE-2025-2075

CVE, Research URL

CVE-2025-2075

Date
Apr 04, 2025
Research Description
The Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3.0.2. This is due to add_role() and user_role() functions missing proper capability checks performed through the validate_rest_call() function. This makes it possible for unauthenticated attackers to set the role of arbitrary users to administrator granting full access to the site, though privilege escalation requires an active account on the site so this is considered an authenticated privilege escalation.
Affected versions
Min -, max -.
Status
vulnerable
May 15, 2025

Uncanny Automator – Automate everything with the #1 automation, integration &amp; webhooks plugin # CVE-2025-4520

CVE, Research URL

CVE-2025-4520

Date
May 14, 2025
Research Description
The Uncanny Automator plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in versions up to, and including, 6.4.0.2. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update plugin settings.
Affected versions
Min -, max -.
Status
vulnerable

Uncanny Automator – Automate everything with the #1 automation, integration &amp; webhooks plugin # CVE-2025-3623

CVE, Research URL

CVE-2025-3623

Date
May 14, 2025
Research Description
The Uncanny Automator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.4.0.1 via deserialization of untrusted input in the automator_api_decode_message() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files.
Affected versions
Min -, max -.
Status
vulnerable