The AutomatorWP – Automator plugin for no-code automations, webhooks & custom integrations in WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the automatorwp_ajax_import_automation_from_url function in all versions up to, and including, 5.3.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary automations, which can lead to Remote Code Execution or Privilege escalation once such automation is activated by the administrator
Metrics
Affected Vendors & Products
References
History
Tue, 09 Sep 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 09 Sep 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Automatorwp
Automatorwp automatorwp Wordpress Wordpress wordpress |
|
Vendors & Products |
Automatorwp
Automatorwp automatorwp Wordpress Wordpress wordpress |
Tue, 09 Sep 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The AutomatorWP – Automator plugin for no-code automations, webhooks & custom integrations in WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the automatorwp_ajax_import_automation_from_url function in all versions up to, and including, 5.3.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary automations, which can lead to Remote Code Execution or Privilege escalation once such automation is activated by the administrator | |
Title | AutomatorWP – Automator plugin for no-code automations, webhooks & custom integrations in WordPress <= 5.3.6 - Missing Authorization To Authenticated (Subscriber+) Remote Code Execution via Automation Creation | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-09-09T06:40:36.082Z
Updated: 2025-09-09T19:27:02.969Z
Reserved: 2025-08-27T12:25:37.390Z
Link: CVE-2025-9539

Updated: 2025-09-09T19:26:53.134Z

Status : Awaiting Analysis
Published: 2025-09-09T07:15:33.313
Modified: 2025-09-09T16:28:43.660
Link: CVE-2025-9539

No data.