CVE-2024-0452: WordPress AI ChatBot: auth bypass enables OpenAI file upload
HIGH PoC AVAILABLEAny authenticated WordPress subscriber can upload arbitrary files to your linked OpenAI account — this bypasses your OpenAI access controls entirely via a missing capability check in the plugin. Update wpbot to 5.3.5+ immediately and rotate your OpenAI API key. Audit your OpenAI Files API storage for unauthorized uploads and monitor for unexpected API cost spikes.
Risk Assessment
High severity (CVSS 7.7, Scope:Changed). Exploitability is trivial: any registered WordPress user (subscriber role, the lowest privilege level) can trigger this with a single authenticated request — no special skills required. The blast radius extends beyond the WordPress install itself to the connected OpenAI account, meaning the real asset at risk is your OpenAI API key and associated billing/data. Sites with open user registration are immediately exposed.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| wpbot | pip | — | No patch |
Do you use wpbot? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Patch: Update the AI ChatBot plugin to version 5.3.5 or later immediately via WordPress admin panel.
-
Rotate credentials: Revoke and regenerate the OpenAI API key associated with this WordPress installation.
-
Audit: Review files in your OpenAI account (platform.openai.com > Storage > Files) for unauthorized uploads; delete any suspicious entries.
-
Monitor: Set up OpenAI usage alerts to detect unexpected cost spikes or API call anomalies.
-
Workaround (if patching is delayed): Disable user registration on the WordPress site or restrict the OpenAI API key to minimum required permissions via OpenAI's key scoping.
-
Detect: Review WordPress access logs for POST requests to the
openai_file_upload_callbackendpoint from low-privilege user sessions.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-0452?
Any authenticated WordPress subscriber can upload arbitrary files to your linked OpenAI account — this bypasses your OpenAI access controls entirely via a missing capability check in the plugin. Update wpbot to 5.3.5+ immediately and rotate your OpenAI API key. Audit your OpenAI Files API storage for unauthorized uploads and monitor for unexpected API cost spikes.
Is CVE-2024-0452 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-0452, increasing the risk of exploitation.
How to fix CVE-2024-0452?
1. Patch: Update the AI ChatBot plugin to version 5.3.5 or later immediately via WordPress admin panel. 2. Rotate credentials: Revoke and regenerate the OpenAI API key associated with this WordPress installation. 3. Audit: Review files in your OpenAI account (platform.openai.com > Storage > Files) for unauthorized uploads; delete any suspicious entries. 4. Monitor: Set up OpenAI usage alerts to detect unexpected cost spikes or API call anomalies. 5. Workaround (if patching is delayed): Disable user registration on the WordPress site or restrict the OpenAI API key to minimum required permissions via OpenAI's key scoping. 6. Detect: Review WordPress access logs for POST requests to the `openai_file_upload_callback` endpoint from low-privilege user sessions.
What systems are affected by CVE-2024-0452?
This vulnerability affects the following AI/ML architecture patterns: WordPress AI plugin integrations, LLM API-connected web applications, OpenAI fine-tuning pipelines, Shared LLM API accounts across multi-tenant apps.
What is the CVSS score for CVE-2024-0452?
CVE-2024-0452 has a CVSS v3.1 base score of 7.7 (HIGH). The EPSS exploitation probability is 0.21%.
Technical Details
NVD Description
The AI ChatBot plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the openai_file_upload_callback function in all versions up to, and including, 5.3.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload files to a linked OpenAI account.
Exploitation Scenario
An adversary registers a free subscriber account on a WordPress site running the vulnerable AI ChatBot plugin. They then send an authenticated POST request to the `openai_file_upload_callback` endpoint, attaching a crafted file (e.g., a poisoned JSONL fine-tuning dataset or a large binary to inflate costs). The file is uploaded directly to the site owner's OpenAI account without any capability verification. In a targeted attack, the adversary could upload a malicious fine-tuning dataset designed to backdoor or degrade the model if the site owner later uses those files for fine-tuning. In an opportunistic attack, they upload large files repeatedly to inflate the victim's OpenAI API costs.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N References
- plugins.trac.wordpress.org/browser/chatbot/trunk/includes/openai/qcld-bot-openai.php Product
- plugins.trac.wordpress.org/changeset/3089461/chatbot/trunk/includes/openai/qcld-bot-openai.php Patch
- wordfence.com/threat-intel/vulnerabilities/id/34b6475c-b5dd-42a1-98d1-9b5ae9ff4ad5 3rd Party
- github.com/fkie-cad/nvd-json-data-feeds Exploit
Timeline
Related Vulnerabilities
CVE-2024-0453 7.7 WordPress ChatBot: missing authz deletes OpenAI files
Same package: wpbot CVE-2023-1651 5.4 AI ChatBot WP: auth bypass exposes OpenAI config + XSS
Same package: wpbot CVE-2024-0451 5.0 wpbot: missing auth exposes OpenAI account files
Same package: wpbot CVE-2025-2828 10.0 LangChain RequestsToolkit: SSRF exposes cloud metadata
Same attack type: Auth Bypass CVE-2025-53767 10.0 Azure OpenAI: SSRF EoP, no auth required (CVSS 10)
Same attack type: Auth Bypass
AI Threat Alert