Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

Posted on September 24, 2025September 24, 2025 By CWS

Cybersecurity researchers have disclosed two safety flaws in Wondershare RepairIt that uncovered personal person knowledge and doubtlessly uncovered the system to synthetic intelligence (AI) mannequin tampering and provide chain dangers.
The critical-rated vulnerabilities in query, found by Pattern Micro, are listed under –

CVE-2025-10643 (CVSS rating: 9.1) – An authentication bypass vulnerability that exists inside the permissions granted to a storage account token
CVE-2025-10644 (CVSS rating: 9.4) – An authentication bypass vulnerability that exists inside the permissions granted to an SAS token

Profitable exploitation of the 2 flaws can permit an attacker to avoid authentication safety on the system and launch a provide chain assault, finally ensuing within the execution of arbitrary code on prospects’ endpoints.
Pattern Micro researchers Alfredo Oliveira and David Fiser mentioned the AI-powered knowledge restore and picture enhancing utility “contradicted its privateness coverage by amassing, storing, and, because of weak Growth, Safety, and Operations (DevSecOps) practices, inadvertently leaking personal person knowledge.”
The poor improvement practices embody embedding overly permissive cloud entry tokens immediately within the utility’s code that allows learn and write entry to delicate cloud storage. Moreover, the info is claimed to have been saved with out encryption, doubtlessly opening the door to wider abuse of customers’ uploaded pictures and movies.
To make issues worse, the uncovered cloud storage comprises not solely person knowledge but additionally AI fashions, software program binaries for varied merchandise developed by Wondershare, container pictures, scripts, and firm supply code, enabling an attacker to tamper with AI fashions or the executables, paving the way in which for provide chain assaults focusing on its downstream prospects.

“As a result of the binary robotically retrieves and executes AI fashions from the unsecure cloud storage, attackers might modify these fashions or their configurations and infect customers unknowingly,” the researchers mentioned. “Such an assault might distribute malicious payloads to reputable customers by way of vendor-signed software program updates or AI mannequin downloads.”
Past buyer knowledge publicity and AI mannequin manipulation, the problems may pose grave penalties, starting from mental property theft and regulatory penalties to erosion of shopper belief.
The cybersecurity firm mentioned it responsibly disclosed the 2 points by way of its Zero Day Initiative (ZDI) in April 2025, however not that it has but to obtain a response from the seller regardless of repeated makes an attempt. Within the absence of a repair, customers are really useful to “prohibit interplay with the product.”
“The necessity for fixed improvements fuels a corporation’s rush to get new options to market and preserve competitiveness, however they won’t foresee the brand new, unknown methods these options could possibly be used or how their performance might change sooner or later,” Pattern Micro mentioned.

“This explains how vital safety implications could also be ignored. That’s the reason it’s essential to implement a powerful safety course of all through one’s group, together with the CD/CI pipeline.”
The Want for AI and Safety to Go Hand in Hand
The event comes as Pattern Micro beforehand warned towards exposing Mannequin Context Protocol (MCP) servers with out authentication or storing delicate credentials comparable to MCP configurations in plaintext, which risk actors can exploit to realize entry to cloud sources, databases, or inject malicious code.
Every MCP server acts as an open door to its knowledge supply: databases, cloud providers, inside APIs, or challenge administration techniques,” the researchers mentioned. “With out authentication, delicate knowledge comparable to commerce secrets and techniques and buyer data turns into accessible to everybody.”
In December 2024, the corporate additionally discovered that uncovered container registries could possibly be abused to realize unauthorized entry and pull goal Docker pictures to extract the AI mannequin inside it, modify the mannequin’s parameters to affect its predictions, and push the tampered picture again to the uncovered registry.
“The tampered mannequin might behave usually underneath typical circumstances, solely displaying its malicious alterations when triggered by particular inputs,” Pattern Micro mentioned. “This makes the assault significantly harmful, because it might bypass fundamental testing and safety checks.”
The availability chain danger posed by MCP servers has additionally been highlighted by Kaspersky, which devised a proof-of-concept (PoC) exploit to spotlight how MCP servers put in from untrusted sources can conceal reconnaissance and knowledge exfiltration actions underneath the guise of an AI-powered productiveness software.
“Putting in an MCP server mainly provides it permission to run code on a person machine with the person’s privileges,” safety researcher Mohamed Ghobashy mentioned. “Except it’s sandboxed, third-party code can learn the identical recordsdata the person has entry to and make outbound community calls – identical to another program.”
The findings present that the speedy adoption of MCP and AI instruments in enterprise settings to allow agentic capabilities, significantly with out clear insurance policies or safety guardrails, can open model new assault vectors, together with software poisoning, rug pulls, shadowing, immediate injection, and unauthorized privilege escalation.

In a report printed final week, Palo Alto Networks Unit 42 revealed that the context attachment characteristic utilized in AI code assistants to bridge an AI mannequin’s data hole may be prone to oblique immediate injection, the place adversaries embed dangerous prompts inside exterior knowledge sources to set off unintended conduct in massive language fashions (LLMs).
Oblique immediate injection hinges on the assistant’s incapacity to distinguish between directions issued by the person and people surreptitiously embedded by the attacker in exterior knowledge sources.
Thus, when a person inadvertently provides to the coding assistant third-party knowledge (e.g., a file, repository, or URL) that has already been tainted by an attacker, the hidden malicious immediate could possibly be weaponized to trick the software into executing a backdoor, injecting arbitrary code into an present codebase, and even leaking delicate info.
“Including this context to prompts permits the code assistant to offer extra correct and particular output,” Unit 42 researcher Osher Jacob mentioned. “Nevertheless, this characteristic might additionally create a possibility for oblique immediate injection assaults if customers unintentionally present context sources that risk actors have contaminated.”
AI coding brokers have additionally been discovered susceptible to what’s known as an “lies-in-the-loop” (LitL) assault that goals to persuade the LLM that the directions it has been fed are a lot safer than they are surely, successfully overriding human-in-the-loop (HitL) defenses put in place when performing high-risk operations.

“LitL abuses the belief between a human and the agent,” Checkmarx researcher Ori Ron mentioned. “In spite of everything, the human can solely reply to what the agent prompts them with, and what the agent prompts the person is inferred from the context the agent is given. It is simple to mislead the agent, inflicting it to offer faux, seemingly secure context through commanding and specific language in one thing like a GitHub concern.”
“And the agent is glad to repeat the mislead the person, obscuring the malicious actions the immediate is supposed to protect towards, leading to an attacker primarily making the agent an confederate in getting the keys to the dominion.”

The Hacker News Tags:Critical, Data, Exposing, Flaws, Models, RepairIt, Uncovered, User, Wondershare

Post navigation

Previous Post: Hackers Can Compromise Chromium Browsers in Windows by Loading Arbitrary Extensions
Next Post: Hackers Target Casino Operator Boyd Gaming

Related Posts

MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More The Hacker News
ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach The Hacker News
What Sets Top-Tier Platforms Apart? The Hacker News
Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers The Hacker News
F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion The Hacker News
Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic
  • Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched
  • Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews
  • Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic
  • Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched
  • Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews
  • Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News