Vulnerability Details : CVE-2023-5646
The AI ChatBot for WordPress is vulnerable to Directory Traversal in version 4.9.2 via the qcld_openai_upload_pagetraining_file function. This allows subscriber-level attackers to append "<?php" to any existing file on the server resulting in potential DoS when appended to critical files such as wp-config.php. This vulnerability is the same as CVE-2023-5241, but was reintroduced in version 4.9.2.
Vulnerability category: Directory traversalDenial of service
Products affected by CVE-2023-5646
We don't have affected product information for this CVE yet
Exploit prediction scoring system (EPSS) score for CVE-2023-5646
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 7 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-5646
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.6
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H |
3.1
|
5.8
|
Wordfence |
CWE ids for CVE-2023-5646
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: security@wordfence.com (Secondary)
References for CVE-2023-5646
-
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2981113%40chatbot%2Ftrunk&old=2980494%40chatbot%2Ftrunk&sfp_email=&sfph_mail=
Diff [2980494:2981113] for chatbot/trunk – WordPress Plugin Repository
-
https://plugins.trac.wordpress.org/browser/chatbot/trunk/includes/openai/qcld-bot-openai.php#L452
429 Too Many Requests
-
https://www.wordfence.com/threat-intel/vulnerabilities/id/c0a9fde0-7677-4e56-b7ac-95fd16a2250f?source=cve
AI ChatBot 4.9.2 - Authenticated (Subscriber+) Directory Traversal to Arbitrary File Write via qcld_openai_upload_pagetraining_file
Jump to