Cyber Posture

CVE-2025-0428

HighRCE

Published: 22 January 2025

Published
22 January 2025
Modified
24 January 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0036 58.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0428 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Aipower Aipower. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked in the top 42.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

This vulnerability is AI-related — categorised as Other Platforms; in the Other ATLAS/OWASP Terms risk domain.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely patching and remediation of the PHP Object Injection flaw in the AI Power WordPress plugin versions up to 1.8.96, directly eliminating the vulnerability as per advisories.

prevent

Mandates validation of untrusted inputs such as $form['post_content'] prior to deserialization, preventing injection of malicious PHP objects.

detect

Enables vulnerability scanning to identify CVE-2025-0428 in the plugin and potential POP chains in other components, facilitating remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
Why these techniques?

PHP Object Injection via deserialization facilitates retrieval of sensitive data from the local system (T1005), arbitrary code execution via PHP interpreter (T1059), and arbitrary file deletion (T1070.004) when chained with a POP chain from other plugins/themes.

NVD Description

The "AI Power: Complete AI Pack" plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.8.96 via deserialization of untrusted input from the $form['post_content'] variable through the wpaicg_export_prompts function. This allows authenticated attackers, with…

more

administrative privileges, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

Deeper analysisAI

CVE-2025-0428 is a PHP Object Injection vulnerability (CWE-502) affecting the "AI Power: Complete AI Pack" WordPress plugin in versions up to and including 1.8.96. The issue arises from deserialization of untrusted input sourced from the $form['post_content'] variable within the wpaicg_export_prompts function, enabling attackers to inject a PHP Object. The vulnerability carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), reflecting high impact potential with network accessibility and low complexity, though requiring high privileges.

Authenticated attackers possessing administrative privileges on a vulnerable WordPress site can exploit this flaw to inject a PHP Object. While no Proof-of-Concept (POP) chain exists within the affected plugin itself, the presence of a POP chain from another installed plugin or theme could escalate the impact, allowing arbitrary file deletion, sensitive data retrieval, or arbitrary code execution.

Mitigation details are outlined in advisories from Wordfence and the WordPress plugin trac repository. The trac changeset 3224162 documents a patch addressing the deserialization issue, and Wordfence provides threat intelligence on the vulnerability at their referenced URL. Security practitioners should update to a patched version of the plugin beyond 1.8.96 and review installed plugins/themes for potential POP chains.

Details

CWE(s)

Affected Products

aipower
aipower
≤ 1.8.97

AI Security AnalysisAI

AI Category
Other Platforms
Risk Domain
Other ATLAS/OWASP Terms
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
The vulnerability affects the 'AI Power: Complete AI Pack' WordPress plugin, which provides AI features like prompt handling for content generation, fitting as an other AI platform/integration rather than core frameworks, libraries, or specific AI domains.

CVEs Like This One

CVE-2025-0429Same product: Aipower Aipower
CVE-2024-13361Same product: Aipower Aipower
CVE-2024-12029Shared CWE-502
CVE-2026-33725Shared CWE-502
CVE-2025-23006Shared CWE-502
CVE-2026-22345Shared CWE-502
CVE-2025-42944Shared CWE-502
CVE-2025-29310Shared CWE-502
CVE-2024-9664Shared CWE-502
CVE-2025-1971Shared CWE-502

References