CVE-2025-10901: CWE-862 Missing Authorization in originalityai Originality.ai AI Checker
The Originality.ai AI Checker plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'ai_get_table' function in all versions up to, and including, 1.0.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read all data in the wp_originalityai_log database table, which can include post titles, scan scores, credits used, and other data.
AI Analysis
Technical Summary
CVE-2025-10901 is a vulnerability identified in the Originality.ai AI Checker plugin for WordPress, affecting all versions up to and including 1.0.12. The core issue is a missing authorization check (CWE-862) in the 'ai_get_table' function, which is responsible for retrieving data from the wp_originalityai_log database table. This table contains sensitive information such as post titles, AI scan scores, and credits used by the plugin. Because the plugin fails to verify whether the requesting user has sufficient privileges, any authenticated user with Subscriber-level access or higher can exploit this flaw to read all stored log data. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS v3.1 score of 4.3 (medium severity) reflects the vulnerability's impact on confidentiality only, with no effect on integrity or availability. The attack vector is network-based, with low attack complexity and no user interaction required, but it does require some level of authentication. No patches or updates have been published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability was reserved on 2025-09-23 and published on 2025-10-24 by Wordfence. This vulnerability can lead to unauthorized disclosure of sensitive operational data, which could be leveraged for further attacks or reconnaissance.
Potential Impact
For European organizations, the primary impact of CVE-2025-10901 is the unauthorized disclosure of sensitive data stored by the Originality.ai plugin. This includes post titles, AI originality scan scores, and credit usage information, which may reveal editorial workflows, content strategies, or usage patterns. While the vulnerability does not allow modification or deletion of data, the exposure of such information could aid attackers in crafting targeted phishing campaigns or social engineering attacks. Websites relying on this plugin for content originality verification may suffer reputational damage if confidential editorial data is leaked. Additionally, organizations subject to strict data protection regulations like GDPR must consider the potential compliance implications of unauthorized data access. The requirement for authenticated access reduces the attack surface but does not eliminate risk, especially in environments where subscriber accounts are easily created or compromised. The vulnerability is particularly relevant for media companies, educational institutions, and content-heavy websites using WordPress and the affected plugin across Europe.
Mitigation Recommendations
1. Immediately restrict Subscriber-level user capabilities to prevent unauthorized access to the plugin's data retrieval functions, for example by implementing custom role permissions or limiting plugin access to trusted roles only. 2. Monitor and audit user accounts with Subscriber or higher privileges to detect any suspicious activity or unauthorized access attempts. 3. Apply web application firewall (WAF) rules to detect and block suspicious requests targeting the 'ai_get_table' function or related API endpoints. 4. If possible, disable or uninstall the Originality.ai AI Checker plugin until an official patch or update addressing the missing authorization check is released. 5. Follow vendor communications closely for security updates or patches and apply them promptly once available. 6. Implement network segmentation and least privilege principles to reduce the risk of lateral movement if subscriber accounts are compromised. 7. Educate users about the risks of account compromise and enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the likelihood of unauthorized access. 8. Regularly back up WordPress databases and monitor logs for unusual access patterns related to the plugin.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10901: CWE-862 Missing Authorization in originalityai Originality.ai AI Checker
Description
The Originality.ai AI Checker plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'ai_get_table' function in all versions up to, and including, 1.0.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read all data in the wp_originalityai_log database table, which can include post titles, scan scores, credits used, and other data.
AI-Powered Analysis
Technical Analysis
CVE-2025-10901 is a vulnerability identified in the Originality.ai AI Checker plugin for WordPress, affecting all versions up to and including 1.0.12. The core issue is a missing authorization check (CWE-862) in the 'ai_get_table' function, which is responsible for retrieving data from the wp_originalityai_log database table. This table contains sensitive information such as post titles, AI scan scores, and credits used by the plugin. Because the plugin fails to verify whether the requesting user has sufficient privileges, any authenticated user with Subscriber-level access or higher can exploit this flaw to read all stored log data. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS v3.1 score of 4.3 (medium severity) reflects the vulnerability's impact on confidentiality only, with no effect on integrity or availability. The attack vector is network-based, with low attack complexity and no user interaction required, but it does require some level of authentication. No patches or updates have been published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability was reserved on 2025-09-23 and published on 2025-10-24 by Wordfence. This vulnerability can lead to unauthorized disclosure of sensitive operational data, which could be leveraged for further attacks or reconnaissance.
Potential Impact
For European organizations, the primary impact of CVE-2025-10901 is the unauthorized disclosure of sensitive data stored by the Originality.ai plugin. This includes post titles, AI originality scan scores, and credit usage information, which may reveal editorial workflows, content strategies, or usage patterns. While the vulnerability does not allow modification or deletion of data, the exposure of such information could aid attackers in crafting targeted phishing campaigns or social engineering attacks. Websites relying on this plugin for content originality verification may suffer reputational damage if confidential editorial data is leaked. Additionally, organizations subject to strict data protection regulations like GDPR must consider the potential compliance implications of unauthorized data access. The requirement for authenticated access reduces the attack surface but does not eliminate risk, especially in environments where subscriber accounts are easily created or compromised. The vulnerability is particularly relevant for media companies, educational institutions, and content-heavy websites using WordPress and the affected plugin across Europe.
Mitigation Recommendations
1. Immediately restrict Subscriber-level user capabilities to prevent unauthorized access to the plugin's data retrieval functions, for example by implementing custom role permissions or limiting plugin access to trusted roles only. 2. Monitor and audit user accounts with Subscriber or higher privileges to detect any suspicious activity or unauthorized access attempts. 3. Apply web application firewall (WAF) rules to detect and block suspicious requests targeting the 'ai_get_table' function or related API endpoints. 4. If possible, disable or uninstall the Originality.ai AI Checker plugin until an official patch or update addressing the missing authorization check is released. 5. Follow vendor communications closely for security updates or patches and apply them promptly once available. 6. Implement network segmentation and least privilege principles to reduce the risk of lateral movement if subscriber accounts are compromised. 7. Educate users about the risks of account compromise and enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the likelihood of unauthorized access. 8. Regularly back up WordPress databases and monitor logs for unusual access patterns related to the plugin.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-23T23:39:25.069Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68fb3a1e0691a1b59916070a
Added to database: 10/24/2025, 8:34:38 AM
Last enriched: 10/24/2025, 8:52:57 AM
Last updated: 10/30/2025, 5:07:37 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-24893: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform
CriticalCVE-2024-2961: CWE-787 Out-of-bounds Write in The GNU C Library glibc
HighCVE-2025-12475: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in creativethemeshq Blocksy Companion
MediumCVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.