Arbitrary File Read Vulnerability in AI Engine for WordPress by ChatGPT
CVE-2025-13380
Key Information:
- Vendor
WordPress
- Vendor
- CVE Published:
- 25 November 2025
Badges
What is CVE-2025-13380?
The AI Engine for WordPress: ChatGPT plugin is susceptible to an Arbitrary File Read vulnerability due to inadequate validation of user-supplied file paths in the 'lqdai_update_post' AJAX endpoint. This issue arises from the improper use of file_get_contents() with URLs controlled by users without proper protocol restrictions within the insert_image() function. Consequently, authenticated users with Contributor-level access and higher can exploit this vulnerability to access arbitrary files on the server, potentially disclosing sensitive information.
Affected Version(s)
AI Engine for WordPress: ChatGPT, GPT Content Generator * <= 1.0.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
Vulnerability published
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability Reserved