Summary
A critical security vulnerability has been discovered in the Post Saint: ChatGPT, GPT-4, DALL-E, Stable Diffusion, Pexels, Dezgo AI Text & Image Generator WordPress plugin.
The flaw, identified as CVE-2024-12471, allows authenticated users with subscriber-level access or higher to upload arbitrary files, potentially enabling remote code execution. This vulnerability affects all versions up to and including 1.3.1.
Key Details:
- Vulnerability Type: Improper Authorization and Input Validation, Arbitrary File Upload
- CVSS Scores: CVSS v3: 8.8 (High)
- Description: The vulnerability is due to missing capability checks and inadequate file type validation in the add_image_to_library AJAX action function. Exploitation could allow attackers to upload malicious files, leading to remote code execution (RCE) on the affected system.
- Affected Versions: Plugin versions up to 1.3.1
- Patch Status: No patch available. The plugin has been temporarily removed from the WordPress Plugin Directory for review.
Potential Attack Vectors
To exploit this vulnerability, an attacker must have an authenticated account (e.g., subscriber level or above). With that level of access, the attacker can upload malicious payloads to compromise server environments and leverage RCE to escalate privileges or exfiltrate sensitive data.
Recommendations
- Deactivate and remove the affected plugin from all WordPress installations.
- If the plugin cannot be removed immediately, restrict access to subscriber accounts and monitor activity.
- Backup your site regularly to reverse potential unauthorized changes.
You should also consider replacing the plugin with an alternative. There are many AI plugins for WordPress that provide similar functionality but receive regular updates that minimize the risk for users.
Stay Secure. Stay Informed.