CVE-2025-10901: CWE-862 Missing Authorization in originalityai Originality.ai AI Checker
The Originality.ai AI Checker plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'ai_get_table' function in all versions up to, and including, 1.0.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read all data in the wp_originalityai_log database table, which can include post titles, scan scores, credits used, and other data.
AI Analysis
Technical Summary
CVE-2025-10901 identifies a missing authorization vulnerability (CWE-862) in the Originality.ai AI Checker plugin for WordPress, present in all versions up to 1.0.12. The vulnerability stems from the absence of a capability check on the 'ai_get_table' function, which is responsible for retrieving data from the wp_originalityai_log database table. This table contains sensitive information including post titles, AI scan scores, credits used, and potentially other metadata related to content originality checks. Because the plugin fails to verify whether the requesting user has sufficient privileges, any authenticated user with Subscriber-level access or higher can invoke this function and retrieve the entire contents of this table. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require the attacker to be authenticated with at least minimal privileges. The CVSS v3.1 score is 4.3 (medium), reflecting the limited scope of impact (confidentiality only) and the low complexity of exploitation. There is no impact on integrity or availability. No patches are currently linked, and no known exploits have been reported in the wild. The issue was reserved in September 2025 and published in October 2025 by Wordfence. The plugin is used primarily on WordPress sites that utilize AI-based originality checking for content, making it relevant for content-heavy websites and digital publishers.
Potential Impact
For European organizations, this vulnerability poses a confidentiality risk by exposing sensitive content-related data to unauthorized users with minimal privileges. This could lead to leakage of unpublished post titles, internal scoring metrics, and usage data that might be leveraged for competitive intelligence or social engineering attacks. While the vulnerability does not allow modification or deletion of data, the exposure of internal metrics and content metadata could undermine trust and violate data protection policies, especially under GDPR if personal data or user-generated content is involved. Organizations relying on Originality.ai for content originality verification, such as media companies, educational institutions, and digital marketing agencies, are particularly at risk. The breach could also facilitate further attacks if attackers use the exposed data to craft targeted phishing or privilege escalation attempts. The lack of known exploits reduces immediate risk, but the ease of exploitation and the widespread use of WordPress in Europe mean the threat should be taken seriously.
Mitigation Recommendations
1. Monitor for plugin updates from Originality.ai and apply patches promptly once released to address the missing authorization check. 2. Until patches are available, restrict Subscriber-level user accounts from accessing the plugin’s functionality by modifying user roles or capabilities using WordPress role management plugins. 3. Implement strict access controls and audit logging on WordPress sites to detect unusual access patterns to the wp_originalityai_log table or plugin endpoints. 4. Consider disabling or uninstalling the Originality.ai AI Checker plugin if it is not essential to reduce attack surface. 5. Conduct internal reviews of user privileges to ensure minimal necessary access is granted, especially for Subscriber roles. 6. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious API calls targeting the vulnerable function. 7. Educate site administrators about the risks of privilege escalation and unauthorized data access related to plugins. 8. Regularly back up WordPress databases and monitor for unauthorized data exfiltration attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10901: CWE-862 Missing Authorization in originalityai Originality.ai AI Checker
Description
The Originality.ai AI Checker plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'ai_get_table' function in all versions up to, and including, 1.0.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read all data in the wp_originalityai_log database table, which can include post titles, scan scores, credits used, and other data.
AI-Powered Analysis
Technical Analysis
CVE-2025-10901 identifies a missing authorization vulnerability (CWE-862) in the Originality.ai AI Checker plugin for WordPress, present in all versions up to 1.0.12. The vulnerability stems from the absence of a capability check on the 'ai_get_table' function, which is responsible for retrieving data from the wp_originalityai_log database table. This table contains sensitive information including post titles, AI scan scores, credits used, and potentially other metadata related to content originality checks. Because the plugin fails to verify whether the requesting user has sufficient privileges, any authenticated user with Subscriber-level access or higher can invoke this function and retrieve the entire contents of this table. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require the attacker to be authenticated with at least minimal privileges. The CVSS v3.1 score is 4.3 (medium), reflecting the limited scope of impact (confidentiality only) and the low complexity of exploitation. There is no impact on integrity or availability. No patches are currently linked, and no known exploits have been reported in the wild. The issue was reserved in September 2025 and published in October 2025 by Wordfence. The plugin is used primarily on WordPress sites that utilize AI-based originality checking for content, making it relevant for content-heavy websites and digital publishers.
Potential Impact
For European organizations, this vulnerability poses a confidentiality risk by exposing sensitive content-related data to unauthorized users with minimal privileges. This could lead to leakage of unpublished post titles, internal scoring metrics, and usage data that might be leveraged for competitive intelligence or social engineering attacks. While the vulnerability does not allow modification or deletion of data, the exposure of internal metrics and content metadata could undermine trust and violate data protection policies, especially under GDPR if personal data or user-generated content is involved. Organizations relying on Originality.ai for content originality verification, such as media companies, educational institutions, and digital marketing agencies, are particularly at risk. The breach could also facilitate further attacks if attackers use the exposed data to craft targeted phishing or privilege escalation attempts. The lack of known exploits reduces immediate risk, but the ease of exploitation and the widespread use of WordPress in Europe mean the threat should be taken seriously.
Mitigation Recommendations
1. Monitor for plugin updates from Originality.ai and apply patches promptly once released to address the missing authorization check. 2. Until patches are available, restrict Subscriber-level user accounts from accessing the plugin’s functionality by modifying user roles or capabilities using WordPress role management plugins. 3. Implement strict access controls and audit logging on WordPress sites to detect unusual access patterns to the wp_originalityai_log table or plugin endpoints. 4. Consider disabling or uninstalling the Originality.ai AI Checker plugin if it is not essential to reduce attack surface. 5. Conduct internal reviews of user privileges to ensure minimal necessary access is granted, especially for Subscriber roles. 6. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious API calls targeting the vulnerable function. 7. Educate site administrators about the risks of privilege escalation and unauthorized data access related to plugins. 8. Regularly back up WordPress databases and monitor for unauthorized data exfiltration attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-23T23:39:25.069Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68fb3a1e0691a1b59916070a
Added to database: 10/24/2025, 8:34:38 AM
Last enriched: 10/31/2025, 9:07:56 AM
Last updated: 12/14/2025, 12:13:04 PM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14656: Buffer Overflow in Tenda AC20
HighCVE-2025-14655: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-14654: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-14653: SQL Injection in itsourcecode Student Management System
MediumCVE-2025-14652: SQL Injection in itsourcecode Online Cake Ordering System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.