CVE-2025-10901

4.3 MEDIUM

📋 TL;DR

The Originality.ai AI Checker WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to read all data from the wp_originalityai_log database table. This exposes post titles, scan scores, credits used, and other sensitive information. All WordPress sites using this plugin up to version 1.0.12 are affected.

💻 Affected Systems

Products:
  • Originality.ai AI Checker WordPress Plugin
Versions: All versions up to and including 1.0.12
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. Attackers need at least Subscriber-level authenticated access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate all logged data including post content metadata, scan results, and usage statistics, potentially revealing sensitive information about content creation and verification activities.

🟠

Likely Case

Low-privilege authenticated users accessing plugin logs they shouldn't have permission to view, exposing content metadata and scan results.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring in place to detect unauthorized database queries.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple - attackers can call the vulnerable function directly.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.0.13 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/originality-ai/trunk/OriginalityAILogger.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Originality.ai AI Checker. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.0.13+ from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

WordPress

Disable the plugin until patched to prevent exploitation

wp plugin deactivate originality-ai

Restrict User Roles

WordPress

Temporarily limit Subscriber and other low-privilege accounts

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unusual database queries to wp_originalityai_log table
  • Consider removing the plugin entirely if patching isn't possible

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is 1.0.12 or lower, you are vulnerable.

Check Version:

wp plugin get originality-ai --field=version

Verify Fix Applied:

After updating, verify plugin version shows 1.0.13 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries to wp_originalityai_log table from non-admin users
  • Multiple failed authorization attempts followed by successful data access

Network Indicators:

  • HTTP requests to WordPress admin-ajax.php or admin-post.php with 'ai_get_table' action from non-admin IPs

SIEM Query:

source="wordpress_logs" AND (uri_path="*/admin-ajax.php" OR uri_path="*/admin-post.php") AND http_params.action="ai_get_table" AND user_role!="administrator"

🔗 References

📤 Share & Export