CVE-2024-6843

6.1 MEDIUM

📋 TL;DR

The Chatbot with ChatGPT WordPress plugin before version 2.4.5 fails to properly sanitize user inputs, allowing unauthenticated attackers to inject malicious scripts. These scripts execute in administrators' browsers when viewing affected pages, enabling stored cross-site scripting attacks. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Chatbot with ChatGPT WordPress plugin
Versions: All versions before 2.4.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and active on a WordPress site. The vulnerability affects user input fields that the plugin processes.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, perform actions as administrators (like installing backdoors), redirect users to malicious sites, or deface websites.

🟠

Likely Case

Attackers inject malicious JavaScript to steal administrator credentials or session tokens, potentially gaining administrative access to the WordPress site.

🟢

If Mitigated

With proper input validation and output escaping, the attack fails and malicious scripts are rendered harmless as text rather than executable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is straightforward to exploit as it requires no authentication and involves simple script injection. Public proof-of-concept details are available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.5

Vendor Advisory: https://wpscan.com/vulnerability/9a5cb440-065a-445a-9a09-55bd5f782e85/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Chatbot with ChatGPT' and check if version is below 2.4.5. 4. Click 'Update Now' if available, or manually update via FTP/SSH by replacing plugin files with version 2.4.5.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Chatbot with ChatGPT plugin until patched

wp plugin deactivate chatbot-with-chatgpt

Implement WAF rules

all

Configure web application firewall to block XSS payloads targeting the plugin

🧯 If You Can't Patch

  • Restrict plugin access to trusted users only using WordPress role capabilities
  • Implement Content Security Policy (CSP) headers to mitigate script execution

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Chatbot with ChatGPT' version. If version is below 2.4.5, the site is vulnerable.

Check Version:

wp plugin get chatbot-with-chatgpt --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 2.4.5 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to plugin endpoints containing script tags or JavaScript code
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests with suspicious parameters containing <script>, javascript:, or encoded payloads

SIEM Query:

source="web_logs" AND (uri="*chatbot*" OR uri="*wp-content/plugins/chatbot-with-chatgpt*") AND (message="*<script>*" OR message="*javascript:*")

🔗 References

📤 Share & Export