CVE-2025-14384

4.3 MEDIUM

📋 TL;DR

The All in One SEO WordPress plugin has a missing capability check on its REST API endpoint, allowing authenticated users with Contributor-level access or higher to retrieve the global AI access token. This vulnerability affects all versions up to and including 4.9.2, potentially exposing sensitive plugin configuration data.

💻 Affected Systems

Products:
  • All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic
Versions: All versions up to and including 4.9.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations using the vulnerable plugin versions. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could use the exposed AI access token to make unauthorized API calls to AI services, potentially incurring costs or accessing AI features reserved for administrators.

🟠

Likely Case

Unauthorized disclosure of the AI access token, which could be used to monitor or interfere with the plugin's AI-powered features.

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place to detect unusual API usage patterns.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with at least Contributor privileges. Simple HTTP request to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.9.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3435276/all-in-one-seo-pack

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find All in One SEO plugin. 4. Click 'Update Now' if available, or manually update to version 4.9.3+. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Restrict Contributor Access

all

Temporarily limit or remove Contributor-level user accounts until patching is complete.

Disable Plugin

linux

Temporarily deactivate the All in One SEO plugin if immediate patching isn't possible.

wp plugin deactivate all-in-one-seo-pack

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unusual API token usage
  • Consider using web application firewall rules to block requests to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → All in One SEO → Version number. If version is 4.9.2 or lower, you are vulnerable.

Check Version:

wp plugin get all-in-one-seo-pack --field=version

Verify Fix Applied:

Verify plugin version is 4.9.3 or higher in WordPress admin panel. Test that Contributor users cannot access /aioseo/v1/ai/credits endpoint.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to /wp-json/aioseo/v1/ai/credits from non-admin users
  • Unusual AI API usage patterns

Network Indicators:

  • GET requests to /wp-json/aioseo/v1/ai/credits from authenticated non-admin users

SIEM Query:

source="wordpress" AND uri_path="/wp-json/aioseo/v1/ai/credits" AND user_role!="administrator"

🔗 References

📤 Share & Export