CVE-2025-10902: CWE-285 Improper Authorization in originalityai Originality.ai AI Checker
The Originality.ai AI Checker plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'ai_scan_result_remove' function in all versions up to, and including, 1.0.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete all data in the wp_originalityai_log database table, which can include post titles, scan scores, credits used, and other data.
AI Analysis
Technical Summary
The Originality.ai AI Checker plugin for WordPress suffers from an improper authorization vulnerability identified as CVE-2025-10902 (CWE-285). The vulnerability exists because the 'ai_scan_result_remove' function lacks a capability check, which is intended to restrict access to authorized users only. As a result, any authenticated user with at least Subscriber-level privileges can invoke this function to delete all entries in the wp_originalityai_log database table. This table stores critical data such as post titles, AI scan scores, and credits used for scans. The vulnerability affects all plugin versions up to and including 1.0.12. The CVSS v3.1 base score is 4.3, reflecting a medium severity level due to the ease of exploitation (low attack complexity, no user interaction) and the limited impact scope (integrity loss only). The flaw does not expose confidential information or cause denial of service but compromises data integrity by enabling unauthorized data deletion. No patches or fixes have been linked yet, and no active exploitation has been reported. The vulnerability is network exploitable and requires authentication but no elevated privileges beyond Subscriber role, which is commonly assigned to registered users on WordPress sites.
Potential Impact
This vulnerability primarily impacts the integrity of data maintained by the Originality.ai AI Checker plugin. Unauthorized deletion of the wp_originalityai_log table entries can result in loss of historical scan data, including post titles and AI-generated originality scores, which may affect content management and auditing processes. Organizations relying on this plugin for content originality verification could face operational disruptions and reduced trust in their content validation workflows. Although it does not directly expose sensitive data or cause service outages, the ability for low-privilege users to delete data could be leveraged in targeted attacks to sabotage content integrity or cover tracks. The impact is more significant for larger organizations or content-heavy websites that depend on accurate AI scan logs for compliance or editorial oversight. Since the vulnerability requires authenticated access, the risk is higher in environments with weak user account management or where subscriber accounts are widely distributed.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict Subscriber-level user capabilities to the minimum necessary and audit user roles to ensure no unauthorized accounts exist. Implement strict access control policies on WordPress user roles, especially limiting the number of users with Subscriber or higher privileges. Monitor and log all database modification activities related to the wp_originalityai_log table to detect suspicious deletions. Until an official patch is released, consider disabling or uninstalling the Originality.ai AI Checker plugin if it is not critical to operations. If continued use is necessary, apply custom code or security plugins to enforce capability checks on the 'ai_scan_result_remove' function, ensuring only authorized administrators can execute it. Regularly back up the WordPress database, including plugin-specific tables, to enable recovery from unauthorized deletions. Stay alert for updates from the vendor and apply patches promptly once available.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, France, Netherlands, Japan, Brazil
CVE-2025-10902: CWE-285 Improper Authorization in originalityai Originality.ai AI Checker
Description
The Originality.ai AI Checker plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'ai_scan_result_remove' function in all versions up to, and including, 1.0.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete all data in the wp_originalityai_log database table, which can include post titles, scan scores, credits used, and other data.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Originality.ai AI Checker plugin for WordPress suffers from an improper authorization vulnerability identified as CVE-2025-10902 (CWE-285). The vulnerability exists because the 'ai_scan_result_remove' function lacks a capability check, which is intended to restrict access to authorized users only. As a result, any authenticated user with at least Subscriber-level privileges can invoke this function to delete all entries in the wp_originalityai_log database table. This table stores critical data such as post titles, AI scan scores, and credits used for scans. The vulnerability affects all plugin versions up to and including 1.0.12. The CVSS v3.1 base score is 4.3, reflecting a medium severity level due to the ease of exploitation (low attack complexity, no user interaction) and the limited impact scope (integrity loss only). The flaw does not expose confidential information or cause denial of service but compromises data integrity by enabling unauthorized data deletion. No patches or fixes have been linked yet, and no active exploitation has been reported. The vulnerability is network exploitable and requires authentication but no elevated privileges beyond Subscriber role, which is commonly assigned to registered users on WordPress sites.
Potential Impact
This vulnerability primarily impacts the integrity of data maintained by the Originality.ai AI Checker plugin. Unauthorized deletion of the wp_originalityai_log table entries can result in loss of historical scan data, including post titles and AI-generated originality scores, which may affect content management and auditing processes. Organizations relying on this plugin for content originality verification could face operational disruptions and reduced trust in their content validation workflows. Although it does not directly expose sensitive data or cause service outages, the ability for low-privilege users to delete data could be leveraged in targeted attacks to sabotage content integrity or cover tracks. The impact is more significant for larger organizations or content-heavy websites that depend on accurate AI scan logs for compliance or editorial oversight. Since the vulnerability requires authenticated access, the risk is higher in environments with weak user account management or where subscriber accounts are widely distributed.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict Subscriber-level user capabilities to the minimum necessary and audit user roles to ensure no unauthorized accounts exist. Implement strict access control policies on WordPress user roles, especially limiting the number of users with Subscriber or higher privileges. Monitor and log all database modification activities related to the wp_originalityai_log table to detect suspicious deletions. Until an official patch is released, consider disabling or uninstalling the Originality.ai AI Checker plugin if it is not critical to operations. If continued use is necessary, apply custom code or security plugins to enforce capability checks on the 'ai_scan_result_remove' function, ensuring only authorized administrators can execute it. Regularly back up the WordPress database, including plugin-specific tables, to enable recovery from unauthorized deletions. Stay alert for updates from the vendor and apply patches promptly once available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-23T23:43:02.828Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68fb3a1e0691a1b59916070e
Added to database: 10/24/2025, 8:34:38 AM
Last enriched: 2/27/2026, 6:43:16 PM
Last updated: 3/25/2026, 4:13:46 AM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.