CVE-2023-5241

AI ChatBot <= 4.8.9 and 4.9.2 - Authenticated (Subscriber+) Directory Traversal to Arbitrary File Write via qcld_openai_upload_pagetraining_file

criticalImproper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
9.6
CVSS Score
9.6
CVSS Score
critical
Severity
4.9.1
Patched in
104d
Time to patch

Description

The AI ChatBot for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.8.9 as well as 4.9.2 via the qcld_openai_upload_pagetraining_file function. This allows subscriber-level attackers to append "<?php" to any existing file on the server resulting in potential DoS when appended to critical files such as wp-config.php.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
None
Confidentiality
High
Integrity
High
Availability

Technical Details

Affected versions<=4.8.9
PublishedOctober 11, 2023
Last updatedJanuary 22, 2024
Affected pluginchatbot

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.