Directory Traversal Vulnerability in AI ChatBot for WordPress by WordPress
CVE-2023-5241
8.1HIGH
Summary
The AI ChatBot for WordPress has a Directory Traversal vulnerability that allows subscriber-level attackers to manipulate files on the server. By exploiting the qcld_openai_upload_pagetraining_file function, attackers can append malicious PHP code, such as '<?php', to existing files. This raises the risk of denial-of-service (DoS) conditions when critical files, like wp-config.php, are targeted. It is essential to upgrade to the latest version to mitigate this vulnerability and protect your WordPress site from potential exploits.
Affected Version(s)
AI ChatBot * <= 4.8.9
AI ChatBot 4.9.1
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Marco Wotschka