Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

Posted on September 24, 2025September 24, 2025 By CWS

Cybersecurity researchers have disclosed two safety flaws in Wondershare RepairIt that uncovered personal person knowledge and doubtlessly uncovered the system to synthetic intelligence (AI) mannequin tampering and provide chain dangers.
The critical-rated vulnerabilities in query, found by Pattern Micro, are listed under –

CVE-2025-10643 (CVSS rating: 9.1) – An authentication bypass vulnerability that exists inside the permissions granted to a storage account token
CVE-2025-10644 (CVSS rating: 9.4) – An authentication bypass vulnerability that exists inside the permissions granted to an SAS token

Profitable exploitation of the 2 flaws can permit an attacker to avoid authentication safety on the system and launch a provide chain assault, finally ensuing within the execution of arbitrary code on prospects’ endpoints.
Pattern Micro researchers Alfredo Oliveira and David Fiser mentioned the AI-powered knowledge restore and picture enhancing utility “contradicted its privateness coverage by amassing, storing, and, because of weak Growth, Safety, and Operations (DevSecOps) practices, inadvertently leaking personal person knowledge.”
The poor improvement practices embody embedding overly permissive cloud entry tokens immediately within the utility’s code that allows learn and write entry to delicate cloud storage. Moreover, the info is claimed to have been saved with out encryption, doubtlessly opening the door to wider abuse of customers’ uploaded pictures and movies.
To make issues worse, the uncovered cloud storage comprises not solely person knowledge but additionally AI fashions, software program binaries for varied merchandise developed by Wondershare, container pictures, scripts, and firm supply code, enabling an attacker to tamper with AI fashions or the executables, paving the way in which for provide chain assaults focusing on its downstream prospects.

“As a result of the binary robotically retrieves and executes AI fashions from the unsecure cloud storage, attackers might modify these fashions or their configurations and infect customers unknowingly,” the researchers mentioned. “Such an assault might distribute malicious payloads to reputable customers by way of vendor-signed software program updates or AI mannequin downloads.”
Past buyer knowledge publicity and AI mannequin manipulation, the problems may pose grave penalties, starting from mental property theft and regulatory penalties to erosion of shopper belief.
The cybersecurity firm mentioned it responsibly disclosed the 2 points by way of its Zero Day Initiative (ZDI) in April 2025, however not that it has but to obtain a response from the seller regardless of repeated makes an attempt. Within the absence of a repair, customers are really useful to “prohibit interplay with the product.”
“The necessity for fixed improvements fuels a corporation’s rush to get new options to market and preserve competitiveness, however they won’t foresee the brand new, unknown methods these options could possibly be used or how their performance might change sooner or later,” Pattern Micro mentioned.

“This explains how vital safety implications could also be ignored. That’s the reason it’s essential to implement a powerful safety course of all through one’s group, together with the CD/CI pipeline.”
The Want for AI and Safety to Go Hand in Hand
The event comes as Pattern Micro beforehand warned towards exposing Mannequin Context Protocol (MCP) servers with out authentication or storing delicate credentials comparable to MCP configurations in plaintext, which risk actors can exploit to realize entry to cloud sources, databases, or inject malicious code.
Every MCP server acts as an open door to its knowledge supply: databases, cloud providers, inside APIs, or challenge administration techniques,” the researchers mentioned. “With out authentication, delicate knowledge comparable to commerce secrets and techniques and buyer data turns into accessible to everybody.”
In December 2024, the corporate additionally discovered that uncovered container registries could possibly be abused to realize unauthorized entry and pull goal Docker pictures to extract the AI mannequin inside it, modify the mannequin’s parameters to affect its predictions, and push the tampered picture again to the uncovered registry.
“The tampered mannequin might behave usually underneath typical circumstances, solely displaying its malicious alterations when triggered by particular inputs,” Pattern Micro mentioned. “This makes the assault significantly harmful, because it might bypass fundamental testing and safety checks.”
The availability chain danger posed by MCP servers has additionally been highlighted by Kaspersky, which devised a proof-of-concept (PoC) exploit to spotlight how MCP servers put in from untrusted sources can conceal reconnaissance and knowledge exfiltration actions underneath the guise of an AI-powered productiveness software.
“Putting in an MCP server mainly provides it permission to run code on a person machine with the person’s privileges,” safety researcher Mohamed Ghobashy mentioned. “Except it’s sandboxed, third-party code can learn the identical recordsdata the person has entry to and make outbound community calls – identical to another program.”
The findings present that the speedy adoption of MCP and AI instruments in enterprise settings to allow agentic capabilities, significantly with out clear insurance policies or safety guardrails, can open model new assault vectors, together with software poisoning, rug pulls, shadowing, immediate injection, and unauthorized privilege escalation.

In a report printed final week, Palo Alto Networks Unit 42 revealed that the context attachment characteristic utilized in AI code assistants to bridge an AI mannequin’s data hole may be prone to oblique immediate injection, the place adversaries embed dangerous prompts inside exterior knowledge sources to set off unintended conduct in massive language fashions (LLMs).
Oblique immediate injection hinges on the assistant’s incapacity to distinguish between directions issued by the person and people surreptitiously embedded by the attacker in exterior knowledge sources.
Thus, when a person inadvertently provides to the coding assistant third-party knowledge (e.g., a file, repository, or URL) that has already been tainted by an attacker, the hidden malicious immediate could possibly be weaponized to trick the software into executing a backdoor, injecting arbitrary code into an present codebase, and even leaking delicate info.
“Including this context to prompts permits the code assistant to offer extra correct and particular output,” Unit 42 researcher Osher Jacob mentioned. “Nevertheless, this characteristic might additionally create a possibility for oblique immediate injection assaults if customers unintentionally present context sources that risk actors have contaminated.”
AI coding brokers have additionally been discovered susceptible to what’s known as an “lies-in-the-loop” (LitL) assault that goals to persuade the LLM that the directions it has been fed are a lot safer than they are surely, successfully overriding human-in-the-loop (HitL) defenses put in place when performing high-risk operations.

“LitL abuses the belief between a human and the agent,” Checkmarx researcher Ori Ron mentioned. “In spite of everything, the human can solely reply to what the agent prompts them with, and what the agent prompts the person is inferred from the context the agent is given. It is simple to mislead the agent, inflicting it to offer faux, seemingly secure context through commanding and specific language in one thing like a GitHub concern.”
“And the agent is glad to repeat the mislead the person, obscuring the malicious actions the immediate is supposed to protect towards, leading to an attacker primarily making the agent an confederate in getting the keys to the dominion.”

The Hacker News Tags:Critical, Data, Exposing, Flaws, Models, RepairIt, Uncovered, User, Wondershare

Post navigation

Previous Post: GeoServer Flaw Exploited in US Federal Agency Hack
Next Post: Hackers Target Casino Operator Boyd Gaming

Related Posts

Deepfake Defense in the Age of AI The Hacker News
New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public The Hacker News
Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws The Hacker News
CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing The Hacker News
Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks The Hacker News
Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors
  • New North Korean IT Worker With Innocent Job Application Get Access to Organization’s Network
  • Hackers Target Casino Operator Boyd Gaming
  • Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models
  • GeoServer Flaw Exploited in US Federal Agency Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors
  • New North Korean IT Worker With Innocent Job Application Get Access to Organization’s Network
  • Hackers Target Casino Operator Boyd Gaming
  • Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models
  • GeoServer Flaw Exploited in US Federal Agency Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News