First published: Thu Oct 19 2023(Updated: )
The AI ChatBot for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.8.9 as well as 4.9.2 via the qcld_openai_upload_pagetraining_file function. This allows subscriber-level attackers to append "<?php" to any existing file on the server resulting in potential DoS when appended to critical files such as wp-config.php.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
<4.9.1 | ||
=4.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5241 is a vulnerability in the AI ChatBot plugin for WordPress that allows attackers to perform directory traversal and potentially cause a denial-of-service (DoS) attack.
CVE-2023-5241 has a severity rating of 9.6 (Critical).
Versions up to and including 4.8.9 as well as version 4.9.2 of AI ChatBot for WordPress are affected by CVE-2023-5241.
An attacker can exploit CVE-2023-5241 by appending "<?php" to any existing file on the server using the qcld_openai_upload_pagetraining_file function, resulting in potential DoS.
Yes, you can find references for CVE-2023-5241 [here](https://plugins.trac.wordpress.org/browser/chatbot/trunk/includes/openai/qcld-bot-openai.php#L376), [here](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2977505%40chatbot%2Ftrunk&old=2967435%40chatbot%2Ftrunk&sfp_email=&sfph_mail=), and [here](https://www.wordfence.com/threat-intel/vulnerabilities/id/25199281-5286-4d75-8d27-26ce215e0993?source=cve).