CVE-2025-0428
📋 TL;DR
The AI Power: Complete AI Pack WordPress plugin up to version 1.8.96 contains a PHP object injection vulnerability that allows authenticated administrators to inject malicious PHP objects. If another plugin or theme provides a POP chain, this could lead to arbitrary file deletion, data theft, or remote code execution.
💻 Affected Systems
- AI Power: Complete AI Pack WordPress plugin
📦 What is this software?
Aipower by Aipower
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise if a POP chain exists from another plugin/theme
Likely Case
Limited impact due to requirement for admin privileges and no POP chain in vulnerable plugin itself
If Mitigated
Minimal impact with proper access controls and no vulnerable plugins/themes installed
🎯 Exploit Status
Requires admin privileges and potentially additional vulnerable plugins/themes for full impact
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 1.8.96
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3224162/
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'AI Power: Complete AI Pack'
4. Click 'Update Now' if available
5. If no update available, deactivate and delete plugin
🔧 Temporary Workarounds
Remove vulnerable plugin
allDeactivate and delete the vulnerable plugin version
wp plugin deactivate ai-power-complete-ai-pack
wp plugin delete ai-power-complete-ai-pack
🧯 If You Can't Patch
- Restrict administrative access to trusted users only
- Monitor for suspicious activity from admin accounts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → AI Power: Complete AI Pack → Version number
Check Version:
wp plugin get ai-power-complete-ai-pack --field=version
Verify Fix Applied:
Verify plugin version is greater than 1.8.96
📡 Detection & Monitoring
Log Indicators:
- Unusual admin user activity
- POST requests to wp-admin/admin-ajax.php with wpaicg_export_prompts action
Network Indicators:
- HTTP requests containing serialized PHP objects in post_content parameter
SIEM Query:
source="wordpress" AND (action="wpaicg_export_prompts" OR post_content CONTAINS "O:")