CVE-2024-13816: CWE-862 Missing Authorization in CodeRevolution Aiomatic - Automatic AI Content Writer & Editor, GPT-3 & GPT-4, ChatGPT ChatBot & AI Toolkit
The Aiomatic - Automatic AI Content Writer & Editor, GPT-3 & GPT-4, ChatGPT ChatBot & AI Toolkit plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability checks on multiple functions in all versions up to, and including, 2.3.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update and delete posts, list and delete batches, list assistant uploaded files, delete personas, delete forms, delete templates, and clear logs. The vulnerability was partially patched in version 2.3.5.
AI Analysis
Technical Summary
CVE-2024-13816 is a missing authorization vulnerability (CWE-862) in the CodeRevolution Aiomatic WordPress plugin, affecting all versions up to and including 2.3.6. The flaw allows authenticated users with low privileges (Subscriber-level and above) to bypass capability checks and perform unauthorized modifications and deletions of content and configuration elements within the plugin. Although version 2.3.5 partially addressed the issue, the vulnerability persists through 2.3.6. The CVSS 3.1 base score is 5.4, reflecting a medium severity with network attack vector, low attack complexity, and privileges required at the low level.
Potential Impact
Authenticated users with Subscriber-level privileges or higher can exploit this vulnerability to modify or delete posts, batches, assistant-uploaded files, personas, forms, templates, and logs without proper authorization. This can lead to unauthorized data modification and potential loss of data integrity within the affected WordPress site.
Mitigation Recommendations
A partial fix was implemented in version 2.3.5, but the vulnerability remains in versions up to 2.3.6. No explicit patch or full remediation status is provided in the available data. Users should verify with the vendor for updated patches beyond version 2.3.6. Until a full fix is confirmed, restrict user roles to trusted individuals only and monitor for suspicious activity related to the plugin's functionalities.
CVE-2024-13816: CWE-862 Missing Authorization in CodeRevolution Aiomatic - Automatic AI Content Writer & Editor, GPT-3 & GPT-4, ChatGPT ChatBot & AI Toolkit
Description
The Aiomatic - Automatic AI Content Writer & Editor, GPT-3 & GPT-4, ChatGPT ChatBot & AI Toolkit plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability checks on multiple functions in all versions up to, and including, 2.3.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update and delete posts, list and delete batches, list assistant uploaded files, delete personas, delete forms, delete templates, and clear logs. The vulnerability was partially patched in version 2.3.5.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-13816 is a missing authorization vulnerability (CWE-862) in the CodeRevolution Aiomatic WordPress plugin, affecting all versions up to and including 2.3.6. The flaw allows authenticated users with low privileges (Subscriber-level and above) to bypass capability checks and perform unauthorized modifications and deletions of content and configuration elements within the plugin. Although version 2.3.5 partially addressed the issue, the vulnerability persists through 2.3.6. The CVSS 3.1 base score is 5.4, reflecting a medium severity with network attack vector, low attack complexity, and privileges required at the low level.
Potential Impact
Authenticated users with Subscriber-level privileges or higher can exploit this vulnerability to modify or delete posts, batches, assistant-uploaded files, personas, forms, templates, and logs without proper authorization. This can lead to unauthorized data modification and potential loss of data integrity within the affected WordPress site.
Mitigation Recommendations
A partial fix was implemented in version 2.3.5, but the vulnerability remains in versions up to 2.3.6. No explicit patch or full remediation status is provided in the available data. Users should verify with the vendor for updated patches beyond version 2.3.6. Until a full fix is confirmed, restrict user roles to trusted individuals only and monitor for suspicious activity related to the plugin's functionalities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-30T23:49:33.047Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d17b7ef31ef0b56dd51
Added to database: 2/25/2026, 9:43:51 PM
Last enriched: 4/9/2026, 1:22:36 PM
Last updated: 4/12/2026, 8:32:38 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.