CVE-2025-13380
📋 TL;DR
This vulnerability allows authenticated WordPress users with Contributor-level access or higher to read arbitrary files on the server through the AI Engine plugin. Attackers can exploit insufficient path validation and unrestricted URL protocols to access sensitive files like configuration files, database credentials, or other private data. All WordPress sites using vulnerable versions of the AI Engine plugin are affected.
💻 Affected Systems
- AI Engine for WordPress: ChatGPT, GPT Content Generator plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers obtain database credentials, SSH keys, or other sensitive configuration files leading to full system compromise, data theft, or lateral movement within the network.
Likely Case
Attackers read WordPress configuration files (wp-config.php) containing database credentials, potentially leading to database access and site takeover.
If Mitigated
With proper access controls and network segmentation, impact is limited to file read within the web server's accessible directories.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward with publicly available proof-of-concept code.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.2 or later
Vendor Advisory: https://plugins.trac.wordpress.org/browser/liquid-chatgpt/tags/1.0.2/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'AI Engine for WordPress: ChatGPT, GPT Content Generator'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.0.2+ from WordPress plugin repository and manually update.
🔧 Temporary Workarounds
Disable vulnerable AJAX endpoint
allRemove or restrict access to the vulnerable 'lqdai_update_post' AJAX endpoint
Add to theme's functions.php or custom plugin: remove_action('wp_ajax_lqdai_update_post', 'lqdai_update_post');
Restrict user roles
allTemporarily remove Contributor and higher roles from untrusted users
🧯 If You Can't Patch
- Immediately disable the AI Engine plugin via WordPress admin or by renaming its directory
- Implement web application firewall rules to block requests to the vulnerable AJAX endpoints
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for 'AI Engine for WordPress' version 1.0.1 or earlier
Check Version:
wp plugin list --name='AI Engine for WordPress' --field=version (if WP-CLI installed)
Verify Fix Applied:
Confirm plugin version is 1.0.2 or later in WordPress admin plugins page
📡 Detection & Monitoring
Log Indicators:
- POST requests to /wp-admin/admin-ajax.php with action=lqdai_update_post containing file paths
- File read attempts on sensitive paths like wp-config.php, /etc/passwd, or other system files
Network Indicators:
- Unusual outbound connections from web server to internal resources following file read attempts
SIEM Query:
source="web_access_logs" AND uri="/wp-admin/admin-ajax.php" AND post_data="action=lqdai_update_post" AND (post_data CONTAINS "../" OR post_data CONTAINS "/etc/" OR post_data CONTAINS "wp-config")
🔗 References
- https://github.com/d0n601/CVE-2025-13380
- https://plugins.trac.wordpress.org/browser/liquid-chatgpt/tags/1.0.1/liquid-chatgpt.php#L315
- https://plugins.trac.wordpress.org/browser/liquid-chatgpt/tags/1.0.1/liquid-chatgpt.php#L423
- https://plugins.trac.wordpress.org/browser/liquid-chatgpt/tags/1.0.1/liquid-chatgpt.php#L83
- https://ryankozak.com/posts/cve-2025-13380/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ae0abace-9bf6-4ef9-a9b8-7efffbf25628?source=cve