Skip to main content

CVE-2024-0699: CWE-434 Unrestricted Upload of File with Dangerous Type in tigroumeow AI Engine: Chatbots, Generators, Assistants, GPT 4 and more!

Medium
VulnerabilityCVE-2024-0699cvecve-2024-0699cwe-434
Published: Mon Feb 05 2024 (02/05/2024, 21:21:32 UTC)
Source: CVE
Vendor/Project: tigroumeow
Product: AI Engine: Chatbots, Generators, Assistants, GPT 4 and more!

Description

The AI Engine: Chatbots, Generators, Assistants, GPT 4 and more! plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'add_image_from_url' function in all versions up to, and including, 2.1.4. This makes it possible for authenticated attackers, with Editor access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 07/04/2025, 18:43:12 UTC

Technical Analysis

CVE-2024-0699 is a vulnerability identified in the WordPress plugin 'AI Engine: Chatbots, Generators, Assistants, GPT 4 and more!' developed by tigroumeow. This plugin facilitates AI-powered chatbot and content generation functionalities within WordPress sites. The vulnerability arises from improper validation of file types in the 'add_image_from_url' function present in all versions up to and including 2.1.4. Specifically, the plugin fails to restrict the types of files that authenticated users with Editor privileges or higher can upload. This lack of validation allows these users to upload arbitrary files, including potentially malicious scripts or executables, to the server hosting the WordPress site. Given that Editors have significant content management permissions, an attacker who compromises or has access to such an account can exploit this flaw to upload files that could lead to remote code execution (RCE). The CVSS 3.1 base score is 6.6, indicating a medium severity level, with the vector string CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H. This reflects that the attack can be performed remotely over the network but requires high privileges (Editor or above) and no user interaction. The vulnerability impacts confidentiality, integrity, and availability, as successful exploitation could allow an attacker to execute arbitrary code on the server, potentially leading to full site compromise. No known public exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability is classified under CWE-434, which concerns unrestricted upload of files with dangerous types, a common vector for web application compromise.

Potential Impact

For European organizations using WordPress sites with the affected AI Engine plugin, this vulnerability poses a significant risk. If an attacker gains Editor-level access—either through credential compromise, social engineering, or insider threat—they could upload malicious files leading to remote code execution. This could result in unauthorized data access, defacement, malware deployment, or pivoting to other internal systems. Given the widespread use of WordPress across European businesses, including SMEs, educational institutions, and public sector websites, the impact could be broad. Compromise of websites could lead to data breaches involving personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Additionally, attackers could leverage compromised sites for phishing, spreading misinformation, or launching further attacks. The medium CVSS score suggests that while exploitation requires elevated privileges, the consequences of a successful attack are severe, affecting confidentiality, integrity, and availability of the affected systems.

Mitigation Recommendations

1. Immediate mitigation involves restricting Editor and higher privileges to trusted users only and auditing existing user accounts for suspicious activity. 2. Disable or remove the vulnerable plugin if it is not essential to reduce the attack surface. 3. Monitor file upload directories for unauthorized or suspicious files, especially those with executable extensions or unusual content. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious upload attempts targeting the 'add_image_from_url' function or related endpoints. 5. Enforce strict file type validation and sanitization at the application level if custom modifications are possible. 6. Regularly update the plugin once a patch is released by the vendor; meanwhile, consider applying temporary patches or workarounds recommended by security advisories or the WordPress community. 7. Employ intrusion detection systems (IDS) and conduct regular security audits to detect early signs of exploitation. 8. Educate site administrators and editors about phishing and credential security to prevent privilege escalation. 9. Backup website data and configurations regularly to enable quick recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-01-18T20:04:56.876Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec334

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:43:12 PM

Last updated: 8/15/2025, 6:06:32 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats