CVE-2023-5241
moderate-risk
Published 2023-10-19
The AI ChatBot for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.8.9 as well as 4.9.2 via the qcld_openai_upload_pagetraining_file function. This allows subscriber-level attackers to append "<?php" to any existing file on the server resulting in potential DoS when appended to critical files such as wp-config.php.
Do I need to act?
~
2.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.6/10
Critical
NETWORK
/ LOW complexity
Affected Vendors
References (7)
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/25199281-5286-4d75-8d2...
Third Party Advisory
http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injec...
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/25199281-5286-4d75-8d2...
45
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
6/34 · Minimal
Exposure
7/34 · Low