CVE-2025-0429
📋 TL;DR
This vulnerability allows authenticated WordPress administrators to perform PHP object injection through the 'AI Power: Complete AI Pack' plugin. Attackers could potentially execute arbitrary code, delete files, or access sensitive data if other plugins/themes provide the necessary POP chain. Only WordPress sites using vulnerable plugin versions are affected.
💻 Affected Systems
- AI Power: Complete AI Pack WordPress plugin
📦 What is this software?
Aipower by Aipower
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise if a POP chain exists from other installed plugins/themes
Likely Case
Limited impact due to requirement for admin privileges and lack of POP chain in vulnerable plugin alone
If Mitigated
No impact if plugin is patched or removed, or if no other vulnerable plugins/themes are installed
🎯 Exploit Status
Requires admin privileges and depends on presence of POP chain from other plugins/themes
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.8.97 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3224162/
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'AI Power: Complete AI Pack'
4. Click 'Update Now' if available
5. Alternatively, download version 1.8.97+ from WordPress repository
🔧 Temporary Workarounds
Disable vulnerable plugin
WordPressTemporarily deactivate the plugin until patched
wp plugin deactivate ai-power-complete-ai-pack
🧯 If You Can't Patch
- Remove administrative access from untrusted users
- Implement web application firewall rules to block suspicious POST requests to wp-admin/admin-ajax.php
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → AI Power: Complete AI Pack → Version number
Check Version:
wp plugin get ai-power-complete-ai-pack --field=version
Verify Fix Applied:
Confirm plugin version is 1.8.97 or higher after update
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /wp-admin/admin-ajax.php with action=wpaicg_export_ai_forms
- Serialized PHP objects in POST data
Network Indicators:
- HTTP requests containing serialized PHP objects in POST parameters
SIEM Query:
source="wordpress.log" AND "wpaicg_export_ai_forms" AND ("O:" OR "C:" OR "a:" in POST data)