Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13361: CWE-862 Missing Authorization in senols AI Power: Complete AI Pack

0
Medium
VulnerabilityCVE-2024-13361cvecve-2024-13361cwe-862
Published: Wed Jan 22 2025 (01/22/2025, 07:29:38 UTC)
Source: CVE Database V5
Vendor/Project: senols
Product: AI Power: Complete AI Pack

Description

CVE-2024-13361 is a medium-severity vulnerability in the WordPress plugin AI Power: Complete AI Pack by senols, affecting all versions up to 1. 8. 96. It arises from a missing authorization check in the wpaicg_save_image_media function, allowing authenticated users with Subscriber-level access or higher to upload image files. Attackers can embed shortcode attributes in the image_alt value that execute upon POST requests to the attachment page, potentially leading to unauthorized code execution or data manipulation. Exploitation does not require user interaction but does require authentication at a low privilege level. This vulnerability impacts confidentiality, integrity, and availability of affected WordPress sites. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent abuse. Countries with significant WordPress usage and active web publishing are most at risk, including the United States, India, Brazil, Germany, and the United Kingdom.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:58:53 UTC

Technical Analysis

CVE-2024-13361 is a vulnerability classified under CWE-862 (Missing Authorization) found in the AI Power: Complete AI Pack WordPress plugin developed by senols. The flaw exists in the wpaicg_save_image_media function, which lacks proper capability checks to verify if the authenticated user has sufficient permissions before allowing image uploads. This missing authorization allows any authenticated user with Subscriber-level privileges or above to upload image files containing malicious shortcode attributes embedded within the image_alt metadata field. When a POST request is made to the attachment page, these shortcode attributes can be executed, potentially enabling unauthorized actions such as code execution, data manipulation, or privilege escalation within the WordPress environment. The vulnerability affects all plugin versions up to and including 1.8.96. The CVSS v3.1 base score is 6.3, indicating a medium severity level, with attack vector being network-based, low attack complexity, requiring low privileges, no user interaction, and impacting confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability poses a significant risk due to the low privilege required for exploitation and the potential for executing arbitrary shortcode code. The lack of a patch link suggests that a fix may not yet be available, underscoring the need for immediate mitigation steps by site administrators.

Potential Impact

This vulnerability can have serious consequences for organizations running WordPress sites with the AI Power: Complete AI Pack plugin. An attacker with minimal privileges (Subscriber-level) can upload malicious images containing executable shortcode attributes, potentially leading to unauthorized code execution within the WordPress environment. This can compromise the confidentiality of sensitive data, integrity of website content, and availability of the site if the attacker disrupts normal operations. Exploitation could facilitate further attacks such as privilege escalation, data exfiltration, or website defacement. Given WordPress's widespread use for business, e-commerce, and content publishing, the impact could extend to brand reputation damage, financial loss, and regulatory compliance issues. The vulnerability's network accessibility and lack of user interaction requirement increase the risk of automated exploitation attempts once a patch or exploit becomes public.

Mitigation Recommendations

Until an official patch is released, organizations should implement specific mitigations to reduce risk. First, restrict user roles and permissions strictly, limiting Subscriber-level access to trusted users only. Disable or remove the AI Power: Complete AI Pack plugin if it is not essential. For sites requiring the plugin, consider temporarily disabling image upload capabilities for low-privilege users via custom code or security plugins that enforce capability checks on media uploads. Monitor WordPress logs for unusual POST requests to attachment pages and unexpected shortcode executions. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious shortcode patterns in image metadata. Keep WordPress core and all plugins updated, and subscribe to vendor advisories for patch announcements. Conduct regular security audits and backups to enable rapid recovery if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-13T16:48:48.563Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e51b7ef31ef0b59e2ec

Added to database: 2/25/2026, 9:49:05 PM

Last enriched: 2/26/2026, 1:58:53 AM

Last updated: 2/26/2026, 7:07:38 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats