Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13360: CWE-918 Server-Side Request Forgery (SSRF) in senols AI Power: Complete AI Pack

0
Medium
VulnerabilityCVE-2024-13360cvecve-2024-13360cwe-918
Published: Wed Jan 22 2025 (01/22/2025, 07:29:39 UTC)
Source: CVE Database V5
Vendor/Project: senols
Product: AI Power: Complete AI Pack

Description

CVE-2024-13360 is a Server-Side Request Forgery (SSRF) vulnerability affecting the AI Power: Complete AI Pack WordPress plugin up to version 1. 8. 96. Authenticated users with subscriber-level access or higher can exploit this flaw via the wpaicg_troubleshoot_add_vector() function to make arbitrary web requests originating from the server. This can allow attackers to access or modify internal services that are otherwise inaccessible externally. The vulnerability has a CVSS score of 5. 4, indicating medium severity, with low complexity and no user interaction required. No public exploits are currently known. Organizations using this plugin should prioritize patching or mitigating this issue to prevent potential internal network reconnaissance or data exposure. The threat primarily affects WordPress sites using this plugin globally, with higher risk in countries with widespread WordPress adoption and targeted industries.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:59:06 UTC

Technical Analysis

CVE-2024-13360 is a Server-Side Request Forgery (SSRF) vulnerability identified in the AI Power: Complete AI Pack plugin for WordPress, affecting all versions up to and including 1.8.96. The vulnerability resides in the wpaicg_troubleshoot_add_vector() function, which allows authenticated users with subscriber-level privileges or higher to induce the server to send HTTP requests to arbitrary URLs. SSRF vulnerabilities enable attackers to leverage the server as a proxy to access internal or protected network resources that are not directly reachable from the outside. In this case, an attacker can query or potentially modify information on internal services by crafting specific requests through the vulnerable function. The vulnerability requires authentication but no additional user interaction, and the attack complexity is low. The CVSS v3.1 base score of 5.4 reflects a medium severity rating, with the vector indicating network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and limited confidentiality and integrity impacts. No public exploits have been reported yet, but the vulnerability poses a risk of internal network reconnaissance and data leakage if exploited. The plugin is used in WordPress environments, which are widely deployed globally, making the vulnerability relevant to many organizations that rely on this plugin for AI-powered features. The lack of an official patch at the time of reporting necessitates immediate mitigation steps to reduce exposure.

Potential Impact

The primary impact of this SSRF vulnerability is the potential unauthorized access to internal network resources that are normally inaccessible from external networks. Attackers with subscriber-level access can exploit this flaw to perform internal reconnaissance, potentially discovering sensitive services, databases, or metadata endpoints. This can lead to further exploitation such as data exfiltration, unauthorized modification of internal services, or pivoting attacks within the network. Although the vulnerability does not directly allow remote code execution or denial of service, the ability to query and modify internal services can compromise confidentiality and integrity of sensitive data. Organizations using the affected plugin risk exposure of internal infrastructure details and sensitive information, which could facilitate more advanced attacks. The medium CVSS score reflects moderate risk, but the impact can be significant in environments where internal services contain critical or sensitive data. The requirement for authenticated access limits the attack surface but does not eliminate risk, especially in environments with weak user access controls or compromised credentials.

Mitigation Recommendations

1. Restrict access to the AI Power: Complete AI Pack plugin features, especially the wpaicg_troubleshoot_add_vector() function, to trusted users only, minimizing the number of accounts with subscriber-level or higher privileges. 2. Implement strict user access controls and monitor for unusual authenticated activity that could indicate exploitation attempts. 3. Use Web Application Firewalls (WAFs) to detect and block suspicious SSRF patterns or anomalous internal requests originating from the web server. 4. Monitor internal network logs and HTTP request logs for unexpected outbound requests to internal services that could indicate SSRF exploitation. 5. Disable or limit the plugin functionality if possible until an official patch or update is released by the vendor. 6. Keep WordPress core and all plugins updated regularly, and apply security patches promptly once available for this vulnerability. 7. Conduct internal network segmentation to limit the exposure of sensitive internal services to the web server. 8. Educate users about the risks of privilege escalation and enforce strong authentication mechanisms to reduce the risk of compromised accounts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-13T16:40:14.007Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e51b7ef31ef0b59e2e8

Added to database: 2/25/2026, 9:49:05 PM

Last enriched: 2/26/2026, 1:59:06 AM

Last updated: 2/26/2026, 8:55:38 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats