Skip to main content

CVE-2023-1660: CWE-79 Cross-Site Scripting (XSS) in Unknown AI ChatBot

Medium
VulnerabilityCVE-2023-1660cvecve-2023-1660cwe-79cwe-352
Published: Mon May 08 2023 (05/08/2023, 13:58:05 UTC)
Source: CVE
Vendor/Project: Unknown
Product: AI ChatBot

Description

The AI ChatBot WordPress plugin before 4.4.9 does not have authorisation and CSRF in a function hooked to init, allowing unauthenticated users to update some settings, leading to Stored XSS due to the lack of escaping when outputting them in the admin dashboard

AI-Powered Analysis

AILast updated: 07/07/2025, 00:26:52 UTC

Technical Analysis

CVE-2023-1660 is a medium-severity vulnerability affecting the AI ChatBot WordPress plugin versions prior to 4.4.9. The vulnerability arises from a lack of authorization and Cross-Site Request Forgery (CSRF) protections in a function hooked to the WordPress 'init' action. This flaw allows unauthenticated users to update certain plugin settings. Because these settings are not properly escaped when rendered in the WordPress admin dashboard, this leads to a Stored Cross-Site Scripting (XSS) vulnerability (CWE-79). An attacker can inject malicious JavaScript code into the plugin settings, which will then execute in the context of any administrator viewing the dashboard. The vulnerability combines CWE-79 (Improper Neutralization of Input During Web Page Generation) and CWE-352 (Cross-Site Request Forgery), indicating both input validation and authorization weaknesses. The CVSS v3.1 base score is 6.1, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, but requiring user interaction (an admin to view the dashboard). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. There are no known exploits in the wild, and no official patches have been linked yet. The vulnerability is significant because it allows an unauthenticated attacker to inject persistent malicious scripts that can compromise administrator sessions, potentially leading to credential theft, privilege escalation, or further compromise of the WordPress site.

Potential Impact

For European organizations using the AI ChatBot WordPress plugin, this vulnerability poses a risk to the confidentiality and integrity of their administrative environments. Successful exploitation could allow attackers to hijack administrator sessions, steal sensitive information, or inject further malicious payloads. This is particularly concerning for organizations that rely on WordPress for public-facing websites or internal portals, as compromise could lead to reputational damage, data breaches, or unauthorized changes to website content. Since the vulnerability requires an administrator to view the maliciously crafted settings page, the impact depends on the frequency and security awareness of admin users. However, given the widespread use of WordPress in Europe across various sectors including government, education, and commerce, the threat could be significant if exploited. The lack of authentication and CSRF protections increases the attack surface, making it easier for remote attackers to attempt exploitation without prior access. The medium CVSS score reflects a moderate but non-trivial risk, emphasizing the need for timely mitigation to prevent potential exploitation.

Mitigation Recommendations

European organizations should immediately verify if they use the AI ChatBot WordPress plugin and identify the version in use. Until an official patch is released, organizations should consider the following mitigations: 1) Restrict access to the WordPress admin dashboard to trusted IP addresses or VPNs to reduce exposure to unauthenticated attackers. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious requests attempting to exploit CSRF or inject script payloads targeting the plugin's settings endpoint. 3) Educate administrators to avoid clicking on suspicious links or performing unnecessary plugin configuration changes until the vulnerability is patched. 4) Monitor WordPress logs for unusual POST requests to the plugin's settings functions and for any unexpected changes in plugin configuration. 5) Apply the principle of least privilege by limiting the number of users with administrator rights. 6) Once available, promptly update the AI ChatBot plugin to version 4.4.9 or later to remediate the vulnerability. 7) Consider temporarily disabling or uninstalling the plugin if it is not critical to operations until a patch is applied. These steps go beyond generic advice by focusing on access controls, monitoring, and administrative hygiene specific to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-03-27T14:29:14.721Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc486

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 12:26:52 AM

Last updated: 7/31/2025, 10:34:52 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats