CVE-2024-0451
📋 TL;DR
The AI ChatBot WordPress plugin has an authorization vulnerability that allows authenticated users with subscriber-level access or higher to list files from a linked OpenAI account. This occurs because the openai_file_list_callback function lacks proper capability checks. WordPress sites using vulnerable plugin versions are affected.
💻 Affected Systems
- AI ChatBot WordPress Plugin
📦 What is this software?
Wpbot by Quantumcloud
⚠️ Risk & Real-World Impact
Worst Case
Attackers could enumerate sensitive files in OpenAI accounts, potentially exposing confidential data, API keys, or proprietary information stored in those accounts.
Likely Case
Low-privileged users could discover file names and metadata from OpenAI accounts, potentially enabling further attacks or information gathering.
If Mitigated
With proper access controls, only authorized administrators could access OpenAI file listings, preventing information disclosure.
🎯 Exploit Status
Exploitation requires authenticated access to WordPress with subscriber privileges or higher.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.3.5 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3089461/chatbot/trunk/includes/openai/qcld-bot-openai.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'AI ChatBot' and click 'Update Now'. 4. Alternatively, download version 5.3.5+ from WordPress plugin repository and replace the plugin files.
🔧 Temporary Workarounds
Temporary Access Restriction
allRestrict subscriber-level user creation and review existing low-privilege accounts
Plugin Deactivation
linuxTemporarily disable the AI ChatBot plugin until patched
wp plugin deactivate chatbot
🧯 If You Can't Patch
- Remove subscriber-level user accounts or restrict their creation
- Monitor WordPress user activity logs for suspicious file listing attempts
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin panel under Plugins → Installed Plugins. If AI ChatBot version is 5.3.4 or lower, it's vulnerable.
Check Version:
wp plugin get chatbot --field=version
Verify Fix Applied:
Verify plugin version is 5.3.5 or higher after update. Check that the openai_file_list_callback function includes proper capability checks.
📡 Detection & Monitoring
Log Indicators:
- Unusual API calls to OpenAI file listing endpoints from non-admin users
- Multiple file listing requests from subscriber-level accounts
Network Indicators:
- HTTP POST requests to /wp-admin/admin-ajax.php with action=openai_file_list from non-admin IPs
SIEM Query:
source="wordpress.log" AND "openai_file_list" AND user_role!="administrator"
🔗 References
- https://plugins.trac.wordpress.org/browser/chatbot/trunk/includes/openai/qcld-bot-openai.php#L175
- https://plugins.trac.wordpress.org/changeset/3089461/chatbot/trunk/includes/openai/qcld-bot-openai.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/1c0572a5-6cc9-43ab-a4a3-c8d3b93c8fcf?source=cve
- https://plugins.trac.wordpress.org/browser/chatbot/trunk/includes/openai/qcld-bot-openai.php#L175
- https://plugins.trac.wordpress.org/changeset/3089461/chatbot/trunk/includes/openai/qcld-bot-openai.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/1c0572a5-6cc9-43ab-a4a3-c8d3b93c8fcf?source=cve