CVE-2024-13361: CWE-862 Missing Authorization in senols AI Power: Complete AI Pack
CVE-2024-13361 is a medium-severity vulnerability in the WordPress plugin AI Power: Complete AI Pack by senols, affecting all versions up to 1. 8. 96. It arises from a missing authorization check in the wpaicg_save_image_media function, allowing authenticated users with Subscriber-level access or higher to upload image files. Attackers can embed shortcode attributes in the image_alt value that execute upon POST requests to the attachment page, potentially leading to unauthorized code execution or data manipulation. Exploitation does not require user interaction but does require authentication at a low privilege level. This vulnerability impacts confidentiality, integrity, and availability of affected WordPress sites. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent abuse. Countries with significant WordPress usage and active web publishing are most at risk, including the United States, India, Brazil, Germany, and the United Kingdom.
AI Analysis
Technical Summary
CVE-2024-13361 is a vulnerability classified under CWE-862 (Missing Authorization) found in the AI Power: Complete AI Pack WordPress plugin developed by senols. The flaw exists in the wpaicg_save_image_media function, which lacks proper capability checks to verify if the authenticated user has sufficient permissions before allowing image uploads. This missing authorization allows any authenticated user with Subscriber-level privileges or above to upload image files containing malicious shortcode attributes embedded within the image_alt metadata field. When a POST request is made to the attachment page, these shortcode attributes can be executed, potentially enabling unauthorized actions such as code execution, data manipulation, or privilege escalation within the WordPress environment. The vulnerability affects all plugin versions up to and including 1.8.96. The CVSS v3.1 base score is 6.3, indicating a medium severity level, with attack vector being network-based, low attack complexity, requiring low privileges, no user interaction, and impacting confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability poses a significant risk due to the low privilege required for exploitation and the potential for executing arbitrary shortcode code. The lack of a patch link suggests that a fix may not yet be available, underscoring the need for immediate mitigation steps by site administrators.
Potential Impact
This vulnerability can have serious consequences for organizations running WordPress sites with the AI Power: Complete AI Pack plugin. An attacker with minimal privileges (Subscriber-level) can upload malicious images containing executable shortcode attributes, potentially leading to unauthorized code execution within the WordPress environment. This can compromise the confidentiality of sensitive data, integrity of website content, and availability of the site if the attacker disrupts normal operations. Exploitation could facilitate further attacks such as privilege escalation, data exfiltration, or website defacement. Given WordPress's widespread use for business, e-commerce, and content publishing, the impact could extend to brand reputation damage, financial loss, and regulatory compliance issues. The vulnerability's network accessibility and lack of user interaction requirement increase the risk of automated exploitation attempts once a patch or exploit becomes public.
Mitigation Recommendations
Until an official patch is released, organizations should implement specific mitigations to reduce risk. First, restrict user roles and permissions strictly, limiting Subscriber-level access to trusted users only. Disable or remove the AI Power: Complete AI Pack plugin if it is not essential. For sites requiring the plugin, consider temporarily disabling image upload capabilities for low-privilege users via custom code or security plugins that enforce capability checks on media uploads. Monitor WordPress logs for unusual POST requests to attachment pages and unexpected shortcode executions. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious shortcode patterns in image metadata. Keep WordPress core and all plugins updated, and subscribe to vendor advisories for patch announcements. Conduct regular security audits and backups to enable rapid recovery if exploitation occurs.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Italy, Spain
CVE-2024-13361: CWE-862 Missing Authorization in senols AI Power: Complete AI Pack
Description
CVE-2024-13361 is a medium-severity vulnerability in the WordPress plugin AI Power: Complete AI Pack by senols, affecting all versions up to 1. 8. 96. It arises from a missing authorization check in the wpaicg_save_image_media function, allowing authenticated users with Subscriber-level access or higher to upload image files. Attackers can embed shortcode attributes in the image_alt value that execute upon POST requests to the attachment page, potentially leading to unauthorized code execution or data manipulation. Exploitation does not require user interaction but does require authentication at a low privilege level. This vulnerability impacts confidentiality, integrity, and availability of affected WordPress sites. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent abuse. Countries with significant WordPress usage and active web publishing are most at risk, including the United States, India, Brazil, Germany, and the United Kingdom.
AI-Powered Analysis
Technical Analysis
CVE-2024-13361 is a vulnerability classified under CWE-862 (Missing Authorization) found in the AI Power: Complete AI Pack WordPress plugin developed by senols. The flaw exists in the wpaicg_save_image_media function, which lacks proper capability checks to verify if the authenticated user has sufficient permissions before allowing image uploads. This missing authorization allows any authenticated user with Subscriber-level privileges or above to upload image files containing malicious shortcode attributes embedded within the image_alt metadata field. When a POST request is made to the attachment page, these shortcode attributes can be executed, potentially enabling unauthorized actions such as code execution, data manipulation, or privilege escalation within the WordPress environment. The vulnerability affects all plugin versions up to and including 1.8.96. The CVSS v3.1 base score is 6.3, indicating a medium severity level, with attack vector being network-based, low attack complexity, requiring low privileges, no user interaction, and impacting confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability poses a significant risk due to the low privilege required for exploitation and the potential for executing arbitrary shortcode code. The lack of a patch link suggests that a fix may not yet be available, underscoring the need for immediate mitigation steps by site administrators.
Potential Impact
This vulnerability can have serious consequences for organizations running WordPress sites with the AI Power: Complete AI Pack plugin. An attacker with minimal privileges (Subscriber-level) can upload malicious images containing executable shortcode attributes, potentially leading to unauthorized code execution within the WordPress environment. This can compromise the confidentiality of sensitive data, integrity of website content, and availability of the site if the attacker disrupts normal operations. Exploitation could facilitate further attacks such as privilege escalation, data exfiltration, or website defacement. Given WordPress's widespread use for business, e-commerce, and content publishing, the impact could extend to brand reputation damage, financial loss, and regulatory compliance issues. The vulnerability's network accessibility and lack of user interaction requirement increase the risk of automated exploitation attempts once a patch or exploit becomes public.
Mitigation Recommendations
Until an official patch is released, organizations should implement specific mitigations to reduce risk. First, restrict user roles and permissions strictly, limiting Subscriber-level access to trusted users only. Disable or remove the AI Power: Complete AI Pack plugin if it is not essential. For sites requiring the plugin, consider temporarily disabling image upload capabilities for low-privilege users via custom code or security plugins that enforce capability checks on media uploads. Monitor WordPress logs for unusual POST requests to attachment pages and unexpected shortcode executions. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious shortcode patterns in image metadata. Keep WordPress core and all plugins updated, and subscribe to vendor advisories for patch announcements. Conduct regular security audits and backups to enable rapid recovery if exploitation occurs.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-13T16:48:48.563Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e51b7ef31ef0b59e2ec
Added to database: 2/25/2026, 9:49:05 PM
Last enriched: 2/26/2026, 1:58:53 AM
Last updated: 2/26/2026, 7:07:38 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.