CVE-2024-13360: CWE-918 Server-Side Request Forgery (SSRF) in senols AI Power: Complete AI Pack
CVE-2024-13360 is a Server-Side Request Forgery (SSRF) vulnerability affecting the AI Power: Complete AI Pack WordPress plugin up to version 1. 8. 96. Authenticated users with subscriber-level access or higher can exploit this flaw via the wpaicg_troubleshoot_add_vector() function to make arbitrary web requests originating from the server. This can allow attackers to access or modify internal services that are otherwise inaccessible externally. The vulnerability has a CVSS score of 5. 4, indicating medium severity, with low complexity and no user interaction required. No public exploits are currently known. Organizations using this plugin should prioritize patching or mitigating this issue to prevent potential internal network reconnaissance or data exposure. The threat primarily affects WordPress sites using this plugin globally, with higher risk in countries with widespread WordPress adoption and targeted industries.
AI Analysis
Technical Summary
CVE-2024-13360 is a Server-Side Request Forgery (SSRF) vulnerability identified in the AI Power: Complete AI Pack plugin for WordPress, affecting all versions up to and including 1.8.96. The vulnerability resides in the wpaicg_troubleshoot_add_vector() function, which allows authenticated users with subscriber-level privileges or higher to induce the server to send HTTP requests to arbitrary URLs. SSRF vulnerabilities enable attackers to leverage the server as a proxy to access internal or protected network resources that are not directly reachable from the outside. In this case, an attacker can query or potentially modify information on internal services by crafting specific requests through the vulnerable function. The vulnerability requires authentication but no additional user interaction, and the attack complexity is low. The CVSS v3.1 base score of 5.4 reflects a medium severity rating, with the vector indicating network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and limited confidentiality and integrity impacts. No public exploits have been reported yet, but the vulnerability poses a risk of internal network reconnaissance and data leakage if exploited. The plugin is used in WordPress environments, which are widely deployed globally, making the vulnerability relevant to many organizations that rely on this plugin for AI-powered features. The lack of an official patch at the time of reporting necessitates immediate mitigation steps to reduce exposure.
Potential Impact
The primary impact of this SSRF vulnerability is the potential unauthorized access to internal network resources that are normally inaccessible from external networks. Attackers with subscriber-level access can exploit this flaw to perform internal reconnaissance, potentially discovering sensitive services, databases, or metadata endpoints. This can lead to further exploitation such as data exfiltration, unauthorized modification of internal services, or pivoting attacks within the network. Although the vulnerability does not directly allow remote code execution or denial of service, the ability to query and modify internal services can compromise confidentiality and integrity of sensitive data. Organizations using the affected plugin risk exposure of internal infrastructure details and sensitive information, which could facilitate more advanced attacks. The medium CVSS score reflects moderate risk, but the impact can be significant in environments where internal services contain critical or sensitive data. The requirement for authenticated access limits the attack surface but does not eliminate risk, especially in environments with weak user access controls or compromised credentials.
Mitigation Recommendations
1. Restrict access to the AI Power: Complete AI Pack plugin features, especially the wpaicg_troubleshoot_add_vector() function, to trusted users only, minimizing the number of accounts with subscriber-level or higher privileges. 2. Implement strict user access controls and monitor for unusual authenticated activity that could indicate exploitation attempts. 3. Use Web Application Firewalls (WAFs) to detect and block suspicious SSRF patterns or anomalous internal requests originating from the web server. 4. Monitor internal network logs and HTTP request logs for unexpected outbound requests to internal services that could indicate SSRF exploitation. 5. Disable or limit the plugin functionality if possible until an official patch or update is released by the vendor. 6. Keep WordPress core and all plugins updated regularly, and apply security patches promptly once available for this vulnerability. 7. Conduct internal network segmentation to limit the exposure of sensitive internal services to the web server. 8. Educate users about the risks of privilege escalation and enforce strong authentication mechanisms to reduce the risk of compromised accounts.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-13360: CWE-918 Server-Side Request Forgery (SSRF) in senols AI Power: Complete AI Pack
Description
CVE-2024-13360 is a Server-Side Request Forgery (SSRF) vulnerability affecting the AI Power: Complete AI Pack WordPress plugin up to version 1. 8. 96. Authenticated users with subscriber-level access or higher can exploit this flaw via the wpaicg_troubleshoot_add_vector() function to make arbitrary web requests originating from the server. This can allow attackers to access or modify internal services that are otherwise inaccessible externally. The vulnerability has a CVSS score of 5. 4, indicating medium severity, with low complexity and no user interaction required. No public exploits are currently known. Organizations using this plugin should prioritize patching or mitigating this issue to prevent potential internal network reconnaissance or data exposure. The threat primarily affects WordPress sites using this plugin globally, with higher risk in countries with widespread WordPress adoption and targeted industries.
AI-Powered Analysis
Technical Analysis
CVE-2024-13360 is a Server-Side Request Forgery (SSRF) vulnerability identified in the AI Power: Complete AI Pack plugin for WordPress, affecting all versions up to and including 1.8.96. The vulnerability resides in the wpaicg_troubleshoot_add_vector() function, which allows authenticated users with subscriber-level privileges or higher to induce the server to send HTTP requests to arbitrary URLs. SSRF vulnerabilities enable attackers to leverage the server as a proxy to access internal or protected network resources that are not directly reachable from the outside. In this case, an attacker can query or potentially modify information on internal services by crafting specific requests through the vulnerable function. The vulnerability requires authentication but no additional user interaction, and the attack complexity is low. The CVSS v3.1 base score of 5.4 reflects a medium severity rating, with the vector indicating network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and limited confidentiality and integrity impacts. No public exploits have been reported yet, but the vulnerability poses a risk of internal network reconnaissance and data leakage if exploited. The plugin is used in WordPress environments, which are widely deployed globally, making the vulnerability relevant to many organizations that rely on this plugin for AI-powered features. The lack of an official patch at the time of reporting necessitates immediate mitigation steps to reduce exposure.
Potential Impact
The primary impact of this SSRF vulnerability is the potential unauthorized access to internal network resources that are normally inaccessible from external networks. Attackers with subscriber-level access can exploit this flaw to perform internal reconnaissance, potentially discovering sensitive services, databases, or metadata endpoints. This can lead to further exploitation such as data exfiltration, unauthorized modification of internal services, or pivoting attacks within the network. Although the vulnerability does not directly allow remote code execution or denial of service, the ability to query and modify internal services can compromise confidentiality and integrity of sensitive data. Organizations using the affected plugin risk exposure of internal infrastructure details and sensitive information, which could facilitate more advanced attacks. The medium CVSS score reflects moderate risk, but the impact can be significant in environments where internal services contain critical or sensitive data. The requirement for authenticated access limits the attack surface but does not eliminate risk, especially in environments with weak user access controls or compromised credentials.
Mitigation Recommendations
1. Restrict access to the AI Power: Complete AI Pack plugin features, especially the wpaicg_troubleshoot_add_vector() function, to trusted users only, minimizing the number of accounts with subscriber-level or higher privileges. 2. Implement strict user access controls and monitor for unusual authenticated activity that could indicate exploitation attempts. 3. Use Web Application Firewalls (WAFs) to detect and block suspicious SSRF patterns or anomalous internal requests originating from the web server. 4. Monitor internal network logs and HTTP request logs for unexpected outbound requests to internal services that could indicate SSRF exploitation. 5. Disable or limit the plugin functionality if possible until an official patch or update is released by the vendor. 6. Keep WordPress core and all plugins updated regularly, and apply security patches promptly once available for this vulnerability. 7. Conduct internal network segmentation to limit the exposure of sensitive internal services to the web server. 8. Educate users about the risks of privilege escalation and enforce strong authentication mechanisms to reduce the risk of compromised accounts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-13T16:40:14.007Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e51b7ef31ef0b59e2e8
Added to database: 2/25/2026, 9:49:05 PM
Last enriched: 2/26/2026, 1:59:06 AM
Last updated: 2/26/2026, 8:55:38 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.